SlideShare a Scribd company logo
EKS Security Best Practices
Getting the Most from Amazon Elastic Kubernetes Service
2©2019 StackRox. All rights reserved.
AMAZO N EK S
Amazon Elastic Kubernetes Service (Amazon EKS) makes it easy to deploy, manage, and scale
containerized applications using Kubernetes on AWS.
3©2019 StackRox. All rights reserved.
What is Kubernetes?
• Open-sourceContainer Workload Orchestrator
• Design by Google based on their internal deployment practices
• Workloads of “pods” containing one or more Docker containers
• Manages starting/restarting/scaling workloads
• Controllers allow for customized behaviors
• Security management capabilities exist but generally not on by default
4©2019 StackRox. All rights reserved.
EKS Cluster Design Considerations
EC2VPC Layout
• Subnets across three+ Availability Zones
• Private subnets + NAT Gateway(s) for worker nodes
• Public subnets for ingress from Internet
High Availability
• EKS creates redundant control plane across three Availability Zones
• User-created node groups should be across multipleAvailability Zones
5©2019 StackRox. All rights reserved.
EKS Cluster Networking
AWSVPC CNI
• EC2 security groups for traffic control
• Firewall controls cannot be applied at
deployment or namespace level
• Does NOT support Kubernetes Network
Policies
• Not cloud portable
• Not suitable for multi-tenant cluster
network segregation
Calico
• Deploys alongside AWSVPC CNI
• Install at any time
• Full Kubernetes Network Policy support
• Supported on all(?) Kubernetes
providers
• Very good controls for multi-tenant
cluster network segregation
6©2019 StackRox. All rights reserved.
Secure Container Images
EC2VPC Layout
• Subnets across three+ Availability Zones
• Private subnets + NAT Gateway(s) for worker nodes
• Public subnets for ingress from Internet
High Availability
• EKS creates redundant control plane across three Availability Zones
• User-created node groups should be across multipleAvailability Zones
7©2019 StackRox. All rights reserved.
Secure Container Images
BuildTime
• Start with a current, secure base image
• Use separate build and runtime images
• Don’t install unneeded software on the runtime image
• Use an image scanner at build time and fail builds with flaws
Third-Party Containers
• Scan before deploying to production
• Keep up-to-date
• Use a Kubernetes admission controller to reject pods with insecure images
• If necessary, build custom image to control content
8©2019 StackRox. All rights reserved.
Pod Runtime Security
• Namespaces
• Kubernetes Role-Based Access Control
• Principle of Least Privilege
• Roles instead of ClusterRoles, RoleBindings instead of ClusterRoleBindings
• Use Network Policies (requiresCalico CNI)
• Limit Container Runtime Privileges
• Service Account for each application
• Use PodSecurityPolicy resources to enforce Principle of Least Privilege
• Protect EC2 Instance Role Credentials
• kube2iam or Network Policies
9©2019 StackRox. All rights reserved.
Additional Best Practices
Do the following:
• Monitor security of clusters and their workloads
• Follow all Helm security practices for tillerd
• Make Kubernetes API endpoint private, if possible
• Keep all resource manifests for each deployment together
• Deploy with identical RBAC, Network Policies, etc., in staging before going to
production
Avoid the following:
• Install the Kubernetes dashboard
• NeglectAWS and EC2 security best practices
10©2019 StackRox. All rights reserved.
Get a free trial of the StackRox Kubernetes Security Platform today!
Visit StackRox.com
11©2019 StackRox. All rights reserved.
TH AN K YO U

More Related Content

PPTX
AWS EKS: Amazon Manages Kubernetes
PDF
Ultimate kubernetes platform on aws with eks
PDF
Introduction to EKS and eksctl
PPTX
Kubernetes on AWS => EKS || CNCF Meetup Zurich, Feb 2019
PPTX
Docker best practices
PDF
Kubernetes On AWS | AWS Kubernetes Tutorial | AWS EKS Tutorial | AWS Training...
PDF
Amazon EKS - Aws community day bengaluru 2019
PPTX
Eks and fargate
AWS EKS: Amazon Manages Kubernetes
Ultimate kubernetes platform on aws with eks
Introduction to EKS and eksctl
Kubernetes on AWS => EKS || CNCF Meetup Zurich, Feb 2019
Docker best practices
Kubernetes On AWS | AWS Kubernetes Tutorial | AWS EKS Tutorial | AWS Training...
Amazon EKS - Aws community day bengaluru 2019
Eks and fargate

What's hot (15)

PPTX
Amazon EKS Deep Dive
PPTX
Amazon EKS: Getting Started
PDF
AWS ECS vs EKS
PDF
Getting Started on Amazon EKS
PDF
Containers Meetup (AWS+CNCF) Milano Jan 15th 2020
PDF
Elastic Kubernetes Services (EKS)
PPTX
Advanced workload scheduling for containers on AWS
PDF
Docker Paris #29
PDF
Amazon EKS Managed Kubernetes Cluster
PDF
AWS Container services
PDF
Hands-on with AWS IoT
PDF
Kubernetes on AWS gone wild
PPTX
Moving Viadeo to AWS (2015)
PDF
Running Docker clusters on AWS (June 2016)
ODP
Hybris install telco accelerators on aws-ec2
Amazon EKS Deep Dive
Amazon EKS: Getting Started
AWS ECS vs EKS
Getting Started on Amazon EKS
Containers Meetup (AWS+CNCF) Milano Jan 15th 2020
Elastic Kubernetes Services (EKS)
Advanced workload scheduling for containers on AWS
Docker Paris #29
Amazon EKS Managed Kubernetes Cluster
AWS Container services
Hands-on with AWS IoT
Kubernetes on AWS gone wild
Moving Viadeo to AWS (2015)
Running Docker clusters on AWS (June 2016)
Hybris install telco accelerators on aws-ec2
Ad

Similar to AWS EKS Security Best Practices (20)

PPTX
EKS security best practices
PDF
EKS Workshop
PDF
Operationalizing Amazon EKS
PPTX
Kubernetes security with AWS
PDF
kubernetes on awsjourneryssdddddddddddddd
PPTX
Meetup CNCF Torino - Amazon EKS March 29th 2019
PDF
TechDays Finland 2020: Best practices of securing web applications running on...
PPTX
Kubernetes-Fundamentals.pptx
PPTX
Amazon Elastic Container Service for Kubernetes (Amazon EKS) I AWS Dev Day 2018
PDF
From Zero to Production with Amazon EKS Blueprints for Terraform
PDF
Trusted Application Delivery: Achieving Ultimate Security
PDF
Builders' Day- Mastering Kubernetes on AWS
PDF
Amazon Elastic Kubernetes Service (EKS) From Zero to Day 1
PDF
Max Körbächer - AWS EKS and beyond – master your Kubernetes deployment on AWS...
PDF
Max Körbächer - AWS EKS and beyond master your Kubernetes deployment on AWS -...
PDF
게임 고객사를 위한 ‘AWS 컨테이너 교육’ 자료 - 유재석 솔루션즈 아키텍트, AWS :: Gaming Immersion Day 201...
PDF
Consolidating Infrastructure with Azure Kubernetes Service
PPTX
Security Practices in Kubernetes
PDF
Introduction to EKS (AWS User Group Slovakia)
PDF
Kubernetes 101 for_penetration_testers_-_null_mumbai
EKS security best practices
EKS Workshop
Operationalizing Amazon EKS
Kubernetes security with AWS
kubernetes on awsjourneryssdddddddddddddd
Meetup CNCF Torino - Amazon EKS March 29th 2019
TechDays Finland 2020: Best practices of securing web applications running on...
Kubernetes-Fundamentals.pptx
Amazon Elastic Container Service for Kubernetes (Amazon EKS) I AWS Dev Day 2018
From Zero to Production with Amazon EKS Blueprints for Terraform
Trusted Application Delivery: Achieving Ultimate Security
Builders' Day- Mastering Kubernetes on AWS
Amazon Elastic Kubernetes Service (EKS) From Zero to Day 1
Max Körbächer - AWS EKS and beyond – master your Kubernetes deployment on AWS...
Max Körbächer - AWS EKS and beyond master your Kubernetes deployment on AWS -...
게임 고객사를 위한 ‘AWS 컨테이너 교육’ 자료 - 유재석 솔루션즈 아키텍트, AWS :: Gaming Immersion Day 201...
Consolidating Infrastructure with Azure Kubernetes Service
Security Practices in Kubernetes
Introduction to EKS (AWS User Group Slovakia)
Kubernetes 101 for_penetration_testers_-_null_mumbai
Ad

Recently uploaded (20)

PDF
Electronic commerce courselecture one. Pdf
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Approach and Philosophy of On baking technology
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPT
Teaching material agriculture food technology
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
KodekX | Application Modernization Development
PDF
NewMind AI Monthly Chronicles - July 2025
PPTX
Cloud computing and distributed systems.
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
cuic standard and advanced reporting.pdf
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Machine learning based COVID-19 study performance prediction
PDF
NewMind AI Weekly Chronicles - August'25 Week I
Electronic commerce courselecture one. Pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Understanding_Digital_Forensics_Presentation.pptx
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Approach and Philosophy of On baking technology
Unlocking AI with Model Context Protocol (MCP)
Mobile App Security Testing_ A Comprehensive Guide.pdf
Teaching material agriculture food technology
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Digital-Transformation-Roadmap-for-Companies.pptx
KodekX | Application Modernization Development
NewMind AI Monthly Chronicles - July 2025
Cloud computing and distributed systems.
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Per capita expenditure prediction using model stacking based on satellite ima...
cuic standard and advanced reporting.pdf
Building Integrated photovoltaic BIPV_UPV.pdf
Machine learning based COVID-19 study performance prediction
NewMind AI Weekly Chronicles - August'25 Week I

AWS EKS Security Best Practices

  • 1. EKS Security Best Practices Getting the Most from Amazon Elastic Kubernetes Service
  • 2. 2©2019 StackRox. All rights reserved. AMAZO N EK S Amazon Elastic Kubernetes Service (Amazon EKS) makes it easy to deploy, manage, and scale containerized applications using Kubernetes on AWS.
  • 3. 3©2019 StackRox. All rights reserved. What is Kubernetes? • Open-sourceContainer Workload Orchestrator • Design by Google based on their internal deployment practices • Workloads of “pods” containing one or more Docker containers • Manages starting/restarting/scaling workloads • Controllers allow for customized behaviors • Security management capabilities exist but generally not on by default
  • 4. 4©2019 StackRox. All rights reserved. EKS Cluster Design Considerations EC2VPC Layout • Subnets across three+ Availability Zones • Private subnets + NAT Gateway(s) for worker nodes • Public subnets for ingress from Internet High Availability • EKS creates redundant control plane across three Availability Zones • User-created node groups should be across multipleAvailability Zones
  • 5. 5©2019 StackRox. All rights reserved. EKS Cluster Networking AWSVPC CNI • EC2 security groups for traffic control • Firewall controls cannot be applied at deployment or namespace level • Does NOT support Kubernetes Network Policies • Not cloud portable • Not suitable for multi-tenant cluster network segregation Calico • Deploys alongside AWSVPC CNI • Install at any time • Full Kubernetes Network Policy support • Supported on all(?) Kubernetes providers • Very good controls for multi-tenant cluster network segregation
  • 6. 6©2019 StackRox. All rights reserved. Secure Container Images EC2VPC Layout • Subnets across three+ Availability Zones • Private subnets + NAT Gateway(s) for worker nodes • Public subnets for ingress from Internet High Availability • EKS creates redundant control plane across three Availability Zones • User-created node groups should be across multipleAvailability Zones
  • 7. 7©2019 StackRox. All rights reserved. Secure Container Images BuildTime • Start with a current, secure base image • Use separate build and runtime images • Don’t install unneeded software on the runtime image • Use an image scanner at build time and fail builds with flaws Third-Party Containers • Scan before deploying to production • Keep up-to-date • Use a Kubernetes admission controller to reject pods with insecure images • If necessary, build custom image to control content
  • 8. 8©2019 StackRox. All rights reserved. Pod Runtime Security • Namespaces • Kubernetes Role-Based Access Control • Principle of Least Privilege • Roles instead of ClusterRoles, RoleBindings instead of ClusterRoleBindings • Use Network Policies (requiresCalico CNI) • Limit Container Runtime Privileges • Service Account for each application • Use PodSecurityPolicy resources to enforce Principle of Least Privilege • Protect EC2 Instance Role Credentials • kube2iam or Network Policies
  • 9. 9©2019 StackRox. All rights reserved. Additional Best Practices Do the following: • Monitor security of clusters and their workloads • Follow all Helm security practices for tillerd • Make Kubernetes API endpoint private, if possible • Keep all resource manifests for each deployment together • Deploy with identical RBAC, Network Policies, etc., in staging before going to production Avoid the following: • Install the Kubernetes dashboard • NeglectAWS and EC2 security best practices
  • 10. 10©2019 StackRox. All rights reserved. Get a free trial of the StackRox Kubernetes Security Platform today! Visit StackRox.com
  • 11. 11©2019 StackRox. All rights reserved. TH AN K YO U