Join us
The post discusses authentication and authorization in Amazon Elastic Kubernetes Service (EKS). It explains how EKS authenticates requests and authorizes access using IAM. It also explores attack vectors like SSRF vulnerabilities and stealing pod identities. The defender-focused section covers preventing pod access to node credentials and auditing with MKAT.
Join other developers and claim your FAUN account now!
Only registered users can post comments. Please, login or signup.