Modular and Scalable Amazon EKS Architecture
Amazon EKS Quick Start

The AWS Documentation website is getting a new look!
Try it now and let us know what you think. Switch to the new look >>

You can return to the original look by selecting English in the language selector above.

Security

Amazon EKS uses IAM to provide authentication to your Kubernetes cluster (through the AWS IAM Authenticator for Kubernetes), but it still relies on native Kubernetes RBAC for authorization. This means that IAM is used only for authentication of valid IAM entities. All permissions for interacting with your Amazon EKS cluster’s Kubernetes API are managed through the native Kubernetes RBAC system. We recommend that you grant least-privilege access via Kubernetes RBAC.