In this section you will learn to work with secrets inside ECS. Passing sensitive information into your application is key pillar to a Well-Architected platform. We will work with an example application to demonstrate how to setup secrets and pass them securely.
This section is broken into two methods of deploying an application in ECS: AWS Copilot and the AWS CDK. Through the following sections, pick a method and use that method through the rest of the chapter by selecting the appropriate method tab.
Please proceed to the next section.