Run the Cerbos PDP as an ECS task or sidecar container alongside your application services.
Run Cerbos as a standalone ECS service or as a sidecar container in your application task definition
Works with both EC2 and Fargate launch types without any changes to the Cerbos container
Register Cerbos with ECS Service Discovery or place behind an ALB for automatic endpoint resolution
Cerbos is an open-source authorization layer that decouples access control from your application code. It runs as a stateless Policy Decision Point (PDP) that evaluates fine-grained policies at request time.
Authorization policies are written in human-readable YAML supporting RBAC, ABAC, and conditional rules. They can be updated, tested, and deployed independently of your application.
Deploying Cerbos via Amazon Elastic Container Service gives you a production-ready authorization service that scales horizontally and fits naturally into your existing infrastructure and observability stack.
A standalone ECS service behind a load balancer is the simplest approach. For the lowest latency, run Cerbos as a sidecar container in the same task definition as your application.
No. Cerbos is fully stateless and requires no database or message queue. Policies can be loaded from a Git repository or Cerbos Hub, no additional infrastructure needed.
Yes. The Cerbos container image runs on both EC2 and Fargate launch types without modification.



What is Cerbos?
Cerbos is an end-to-end enterprise authorization software for Zero Trust environments and AI-powered systems. It enforces fine-grained, contextual, and continuous authorization across apps, APIs, AI agents, MCP servers, services, and workloads.
Cerbos consists of an open-source Policy Decision Point, Enforcement Point integrations, and a centrally managed Policy Administration Plane (Cerbos Hub) that coordinates unified policy-based authorization across your architecture. Enforce least privilege & maintain full visibility into access decisions with Cerbos authorization.