EKS Security
Security
EKS supplies many options to create a secured deployment. There is no one-size-fit-all solution that can be used everywhere, so a certain degree of familiarity with these options is required. We recommend implementing the best practices that were highlighted in the below links and use EKS flexible configuration capabilities to incorporate security processes into the continuous integration pipeline, automating the entire process with security seamlessly “baked in”.
Both Pod Security Policies, Security Concepts and Best practices for cluster security give an overview of EKS concepts and guidelines of security.