AWS EKS
Best practices and references below are based on published guidance from the cloud service provider and may reference native capabilities the cloud service provider offers. If you are not using the native security capabilities, the same security requirement can be met using other security capabilities your organization utilizes
Design Guidance:
Version |
Version | ||
Launch Template-Id |
Design Guidance:
Encryption Config |
Design Guidance:
Encryption Config-Resources |
Design Guidance:
Provider-Key Arn |
Design Guidance:
Role Arn |
Design Guidance:
Resources VPC Config-Security Group Ids |
Remote Access-Source Security Groups |
Design Guidance:
Resources VPC Config-Subnet Ids |
Subnets |
Subnets |
Kubernetes Network Config-Service Ipv4cidr |
Design Guidance:
Name |
Cluster Name | ||
Tags |
Tags |
Design Guidance:
Scaling Config | ||
Scaling Config-Min Size | ||
Scaling Config-Desired Size | ||
Scaling Config-Max Size |
Design Guidance:
Remote Access | ||
Remote Access-EC2SSH Key |
Last modified 1yr ago