Architecture

In this section you will find a description of the resources deployed on your AWS account when you deploy Sysdig Secure for cloud, and how they interact with each other and your resources to provide the security features.

Threat Detection based on CloudTrail

Threat Detection based on CloudTrail architecture

Cloud Connector diagram

Cloud Security Posture Management and Compliance

Cloud Security Posture Management and Compliance diagram

ECR Image Registry Scanning

ECR Image Registry Scanning architecture

Fargate Image Scanning

Fargate Image Scanning architecture

Continue to next sections

Ready to learn more about all of the security capabilities?

Visit the Threat Detection based on CloudTrail section.
Visit the Cloud Security Posture Management and Compliance section.
Visit the ECR Image Registry Scanning section.
Visit the Fargate Image Scanning section.


Please visit any of the following sections for more information: