Security options.
Whether to use traffic encryption between the container layers.
The key used to encrypt stored data.
The VPC configuration.