Help improve this page
Want to contribute to this user guide? Scroll to the bottom of this page and select Edit this page on GitHub. Your contributions will help make our user guide better for everyone.
Security considerations for Kubernetes
The following are considerations for security in the cloud, as they affect Kubernetes in Amazon EKS
clusters. For an in-depth review of security controls and practices in Kubernetes, see Cloud Native
Security and Kubernetes
Topics
- Secure workloads with Kubernetes certificates
- Understand Amazon EKS created RBAC roles and users
- Understand Amazon EKS created pod security policies (PSP)
- Migrate from legacy pod security policies (PSP)
- Encrypt Kubernetes secrets with AWS KMS on existing clusters
- Use AWS Secrets Manager secrets with Amazon EKS pods