Skip to main contentCúram on Kubernetes

EKS Security

Note: Amazon Elastic Kubernetes Service (EKS) is intended for Development and Test purposes only.

Security

EKS supplies many options to create a secured deployment. There is no one-size-fit-all solution that can be used everywhere, so a certain degree of familiarity with these options is required. We recommend implementing the best practices that were highlighted in the below links and use EKS flexible configuration capabilities to incorporate security processes into the continuous integration pipeline, automating the entire process with security seamlessly “baked in”.

Both Pod Security Policies, Security Concepts and Best practices for cluster security give an overview of EKS concepts and guidelines of security.