As part of designing any modern system on AWS, it is necessary to think about the security implications and practices that can affect your security posture. This chalk talk walks you through five key areas to apply best practices for improving the overall security of containerized environments on Amazon EKS using a sample architecture. Learn how to leverage the security footprint on access control, software supply chain, cluster infrastructure, runtime, and data protection.
EKS Security Best Practices Guide EKS Workshop - Security
Amazon EKS and Kubernetes sessions at AWS re:Invent 2024
Verify schedule and location in the AWS Re:invent App
KUB319 | Securing and Optimizing Your Software Supply Chain with Amazon ECR
KUB305 | Securing and observing Amazon EKS clusters
KUB315 | Securing Kubernetes workloads in Amazon EKS
SEC216 | Build trust in your CI/CD pipeline: Codify container security at scale
SEC311 | Secure containers from supply chain attacks
SVS301 | Architecting for data protection and compliance with Amazon ECS
SVS332 | Build secure and performant apps easily with Amazon ECS & AWS Fargate
SVS411 | Securing Amazon ECS workloads with AWS Signer and Amazon GuardDuty
SVS412 | Achieving a secure microservices architecture on Amazon ECS