Skip to content

Latest commit

 

History

History

KUB302

Folders and files

NameName
Last commit message
Last commit date

parent directory

..
 
 

KUB302 | Strategies and Best Practices for Securing Containerized Environments

As part of designing any modern system on AWS, it is necessary to think about the security implications and practices that can affect your security posture. This chalk talk walks you through five key areas to apply best practices for improving the overall security of containerized environments on Amazon EKS using a sample architecture. Learn how to leverage the security footprint on access control, software supply chain, cluster infrastructure, runtime, and data protection.

Related Resources

Slides

EKS Security Best Practices Guide EKS Workshop - Security

Amazon EKS and Kubernetes sessions at AWS re:Invent 2024

Related Sessions

Verify schedule and location in the AWS Re:invent App

KUB319 | Securing and Optimizing Your Software Supply Chain with Amazon ECR

KUB305 | Securing and observing Amazon EKS clusters

KUB315 | Securing Kubernetes workloads in Amazon EKS

SEC216 | Build trust in your CI/CD pipeline: Codify container security at scale

SEC311 | Secure containers from supply chain attacks

SVS301 | Architecting for data protection and compliance with Amazon ECS

SVS332 | Build secure and performant apps easily with Amazon ECS & AWS Fargate

SVS411 | Securing Amazon ECS workloads with AWS Signer and Amazon GuardDuty

SVS412 | Achieving a secure microservices architecture on Amazon ECS

Request an EKS Workshop

AWS Guided EKS Workshop