We recommend that customers looking for strong isolation for their tasks
use Fargate. Fargate runs each task in a hardware virtualization
environment. This ensures that these containerized workloads do not share
network interfaces, Fargate ephemeral storage, CPU, or memory with other
tasks. For more information, see Security Overview of AWS Fargate
Did this page help you? - Yes
Thanks for letting us know we're doing a good job!
If you've got a moment, please tell us what we did right so we can do more of it.
Did this page help you? - No
Thanks for letting us know this page needs work. We're sorry we let you down.
If you've got a moment, please tell us how we can make the documentation better.
Next topic:
Fargate security best practicesPrevious topic:
AWS FargateNeed help?
PrivacySite termsCookie preferences
© 2025, Amazon Web Services, Inc. or its affiliates. All rights reserved.