Help improve this page
Want to contribute to this user guide? Choose the Edit this page on GitHub link that is located in the right pane of every page. Your contributions will help make our user guide better for everyone.
Security considerations for Kubernetes
The following are considerations for security in the cloud, as they affect Kubernetes in Amazon EKS clusters. For an in-depth review of security controls and practices in Kubernetes, see Cloud Native Security and Kubernetes
Topics
- Secure workloads with Kubernetes certificates
- Understand Amazon EKS created RBAC roles and users
- Understand Amazon EKS created pod security policies (PSP)
- Migrate from legacy pod security policies (PSP)
- Encrypt Kubernetes secrets with Amazon KMS on existing clusters
- Use Amazon Secrets Manager secrets with Amazon EKS pods