Attacking and securing cloud identities in managed Kubernetes (Amazon EKS)
The post discusses authentication and authorization in Amazon Elastic Kubernetes Service (EKS). It explains how EKS authenticates requests and authorizes access using IAM. It also explores attack vectors like SSRF vulnerabilities and stealing pod identities. The defender-focused section covers preve..