Join us

Attacking and securing cloud identities in managed Kubernetes (Amazon EKS)

Attacking and securing cloud identities in managed Kubernetes (Amazon EKS)

The post discusses authentication and authorization in Amazon Elastic Kubernetes Service (EKS). It explains how EKS authenticates requests and authorizes access using IAM. It also explores attack vectors like SSRF vulnerabilities and stealing pod identities. The defender-focused section covers preventing pod access to node credentials and auditing with MKAT.


Only registered users can post comments. Please, login or signup.

Start blogging about your favorite technologies, reach more readers and earn rewards!

Join other developers and claim your FAUN account now!

Avatar

The FAUN

@faun
A worldwide community of developers and DevOps enthusiasts!
User Popularity
2k

Influence

243k

Total Hits

1

Posts