Kubernetes clusters can be complex environments with multiple components and configurations. Securing your software supply chain, control plane, worker nodes, and pod security policies is essential to prevent unauthorized access, resource exploitation, and data breaches. In this session, learn about features that can help you secure your Amazon EKS clusters. Get guidance on how security and platform administrators can protect information, systems, and assets that are reliant on Amazon EKS while delivering business value to their customers. This session covers security guidance specific to Amazon EKS, Amazon ECR, AWS Identity and Access Management (IAM), and network security.