Skip to content

Overview

DeepIntShield Enterprise provides private container image distribution through dedicated registries, enabling secure deployments in AWS, GCP, Azure, and on-premise environments.

DeepIntShield uses a hub-and-spoke model with two container registries optimized for each cloud platform:

flowchart TB
subgraph DeepIntShieldInfra[DeepIntShield Infrastructure]
CICD[CI/CD Pipeline]
GCR[GCP Artifact Registry]
ECR[AWS ECR]
end
subgraph Customers[Customer Environments]
subgraph AWSCustomer[AWS Customers]
EKS[EKS Cluster]
ECS[ECS Service]
end
subgraph GCPCustomer[GCP Customers]
GKE[GKE Cluster]
end
subgraph AzureCustomer[Azure Customers]
AKS[AKS Cluster]
end
subgraph OnPrem[On-Premise]
K8S[Kubernetes]
Docker[Docker]
end
end
CICD -->|Push| GCR
CICD -->|Push| ECR
ECR -->|IRSA| EKS
ECR -->|Task Role| ECS
GCR -->|Workload Identity| GKE
GCR -->|Azure WIF| AKS
GCR -->|Basic Auth| OnPrem
Customer CloudRegistry SourceWhy
AWSAWS ECRNative IAM integration, lowest latency within AWS
GCPGCP Artifact RegistryNative Workload Identity, lowest latency within GCP
AzureGCP Artifact RegistryWorkload Identity Federation from Azure to GCP
On-PremiseGCP Artifact RegistryBasic auth with username/password credentials

Choose the authentication method based on your deployment environment:

EnvironmentMethodSecurity LevelSetup Complexity
AWS EKSIRSAHighMedium
AWS ECSIAM Task RolesHighLow
GCP GKEWorkload IdentityHighLow
Azure AKSAzure WIFHighMedium
On-PremiseBasic AuthMediumLow
  • In-Transit: All registry communication uses TLS 1.3
  • At-Rest: Images encrypted using cloud-native encryption (AWS KMS, GCP CMEK)
  • IAM-based: Fine-grained permissions using cloud IAM policies
  • Audit Logging: All image pull operations are logged for compliance
  • IP Restrictions: Optional VPC Service Controls (GCP) or VPC endpoints (AWS)
  • Vulnerability Scanning: Automatic scanning on push
  • Immutable Tags: Optional tag immutability to prevent overwrites
  • Signed Images: Container image signatures for verification

Before deploying DeepIntShield Enterprise, ensure you have:

  • AWS account with ECR access
  • EKS cluster (v1.23+) or ECS cluster
  • IAM permissions to create roles and policies
  • kubectl and aws CLI configured

AWS Deployment

Deploy on EKS or ECS with IRSA authentication

Open →

GCP Deployment

Deploy on GKE with Workload Identity

Open →

Azure Deployment

Deploy on AKS with Azure Workload Identity Federation

Open →

On-Premise

Deploy anywhere with Docker credentials

Open →

For enterprise deployment assistance:

  • Email: contact@getmaxim.ai
  • Slack: Connect via Slack Connect for real-time support
  • Documentation: Platform-specific guides linked above