Eks
Tools
References
- Kubernetes - Role Based Access Control Good Practices
- Amazon EKS Best Practices Guide for Security
- CloudSecDocs - Kubernetes
- OWASP/www-project-kubernetes-top-tenhttps://github.com/OWASP/www-project-kubernetes-top-ten/tree/main
- Kubernetes - Security Checklist
- GKE - Harden your cluster's security
- The Kubenomicon
2024
- (video) Effective building blocks for securing multi-tenant Kubernetes clusters
- Kubernetes Audit Logs Gotchas
2023
- Mark Manning - Risk8s Business
- Sysdig - OWASP Kubernetes Top 10
- RAD Security - EKS Best Practices for Security
- raesene - Let's talk about anonymous access to Kubernetes
2022
- Kubernetes - Securing Admission Controllers
- Marcus Noble - Restricting cluster-admin Permissions
- raesene - The Challenges of Assessing Kubernetes clusters for PCI Compliance
- raesene - Attack of the clones - Stealthy Kubernetes persistence with eathar, tòcan and teisteanas
- (video) Too Much to Choose – Making Sense of a Smorgasbord of Security Standard- Anais Urlichs & Rory McCune
2021
- Snyk - Hardening Amazon EKS security with RBAC, secure IMDS, and audit logging* Bishop Fox - Bad Pods: Kubernetes Pod Privilege Escalation
2020
2019
- re:invent - Running high-security workloads on Amazon EKS
- Attacking and Defending Kubernetes Clusters: A Guided Tour Walkthrough Guide
- CyberArk - Kubernetes Pentest Methodology Part 2