Container Security policies for Amazon ECS clusters contain runtime rules that you can apply to entire clusters.
When creating a policy, you can define the platform this policy will be applied to
and configure the supported security controls for that policy. Admission control is
managed through the policy.
ImportantPolicy configuration for Kubernetes clusters differs from a Amazon ECS
environment. To properly configure Kubernetes protection policies, see Managing Kubernetes protection
policies.
|
Procedure
- Go to .
- Click the Policy tab.
- Create, duplicate, or modify a policy.
-
To create a new policy, click +Create.
-
To duplicate an existing policy:
-
Click to select the base policy from the policy list.
-
Click Duplicate.Container Protection creates a copy of the existing policy and appends "Policy" to the policy name.
-
-
To modify an existing policy, click the policy in the policy list.
-
- For new and duplicated policies, enter the following policy details:
- Specify a unique policy name.

Note
-
Policy names must not contain spaces and only support alphanumeric characters, underscores (_), and periods (.).
-
You cannot modify the policy name after creating the policy.
-
- To provide more detail about the purpose for the policy, use the Description field.The description appears under the policy name in the policy list.
- To receive CREM Risk Insights, Workbench alerts, and use the Search app to investigate security threats throughout your network environment, turn on XDR Telemetry.TrendAI Vision One™ can correlate and assess XDR telemetry data across all configured data sources to provide insights into your network's security and risk posture.
- Select Amazon ECS as the target platform, then
click Proceed to Security Controls.

Note
Once a platform field is set for a policy, it cannot be changed.
- Specify a unique policy name.
- Define the cluster-wide security controls.Deployment rules apply before an image is deployed. Amazon ECS policies do not support Continuous policies.
- Select the rules that you want applied to the
cluster.

Note
The following Resource property rules are only applicable to EC2 deployments (not Fargate):Resource property rule group <Log/Block> rule Task propertiesContainers that run in the host network namespaceContainers that run in the host IPC namespaceContainers that run in the host PID namespaceContainer propertiesPrivileged containers - Select the action
(Log/Block) to apply
after a rule is triggered.Block behaves differently based on the workload type:
-
Standalone tasks: The task is terminated and the violation reason can be seen on the TrendAI Vision One™ console.
-
Replica set services: The service is scaled down to zero, autoscaling is disabled if present, and tags with the violation reasons are added to indicate that the service was blocked by admission control.
-
Daemon set services: An impossible placement constraint is applied to the service, preventing tasks from running, and tags with the violation reason are added to indicate that the service was blocked by admission control.
-
- If the rule provides additional parameters,
define the values to check.Click the add symbol (+) next to the rule to duplicate the rule and have multiple rules of the same rule type.For the Resource properties rule [action] containers with capabilities that do not conform with a [predefined] policy, reference the following table for additional information.Predefined policyDescriptionrestrict-nondefaultsAllows capabilities which are one of the [default Docker capabilities]For more information about default Docker policies, visit the Docker website at: https://docs.docker.com/engine/reference/run/#runtime-privilege-and-linux-capabilitiesbaselineAllows default capabilities but not the NET_RAW capability

Note
NET_RAW is a default capability that allows the use of RAW and PACKET sockets. With this capability, a malicious user may forge packets, execute MITM attacks, and perform other network exploits. This privilege is typically only used for specific networking needs, so dropping it should not have any effect on the majority of applications.restrictedAllows only the NET_BIND_SERVICE capability
Note
NET_BIND_SERVICE is a default capability that allows the binding to internet domain privileged ports (port numbers less than 1024). It is often used by web servers and for giving non-root users access to these ports.restrict-allAllows no capability
Note
TrendAI™ recommends considering container needs and applying a capability policy in alignment with the principle of least privileges. - Configure scan exceptions as required.

Note
An exception is automatically added to allow trusted images used by Container Security. - Configure Image Signature Verification rules as required.This section allows you to enforce that images are signed by a trusted source before they can be deployed. This feature uses attestors, which are managed separately. For more information, see Manage attestors.

Note
-
TrendAI Vision One™ currently only supports verification of signatures for images stored in public registries or images stored on the private ECR of the same account the images are being deployed to. Cross-account private ECR image signature verification is not supported.
-
Policy exceptions do not apply to the signature verification rule. Image Signature Verification has its own exceptions that can be configured using the
Preconditions.
-
Define the Condition(s) to specify which container images the rule applies to.
-
From the Signature material dropdown menu, select one or more pre-configured attestors. Choose whether to Match all or Match any of the selected attestors. If you need to add a new attestor, you can use the Add attestor link in the dropdown menu.
-
Choose the Action to take when an image violates the rule (Log or Block).
-
Click Add new verification rule to create multiple, independent signature rules within the same policy.
-
- Select the rules that you want applied to the
cluster.
- Define the cluster-wide rules that apply while a pod is running by clicking the Runtime tab.The runtime policy consists of the rulesets you create on the Rulesets tab.
- Click Add Ruleset.
- Select the checkbox of the ruleset you want to apply to the policy.
- Click Submit.
- Amazon ECS policies do not support namespace (NamespacedPolicyDefinition) policies.
- Click Create or Save.
