shisho-dojo-logo
AWSGCPAzureAbout Us
signup-button
Top / Amazon Web Service / AWS Amazon EKS

Amazon EKS

55 examples and best practices for AWS Amazon EKS, including AWS Amazon EKS Addon and AWS Amazon EKS Cluster.

terraform-logo

Review your .tf file for AWS best practices

Shisho Cloud, our free checker to make sure your Terraform configuration follows best practices, is available (beta).

Addon
aws_eks_addon (5 example cases)
AWS::EKS::Addon (6 example cases)
Cluster
aws_eks_cluster (5 example cases)
4 best security practices
  1. Ensure public access for AWS EKS cluster endpoint is disabled
  2. Ensure a CIDR range for AWS EKS cluster endpoint access is restricted enough
  3. Ensure to enable control plane logging of your EKS cluster
  4. Ensure to enable envelope encryption of EKS secrets
AWS::EKS::Cluster (10 example cases)
Fargate Profile
aws_eks_fargate_profile (4 example cases)
AWS::EKS::FargateProfile (10 example cases)
Identity Provider Config
aws_eks_identity_provider_config (0 example case)
AWS::EKS::Cluster Provider (0 example case)
Node Group
aws_eks_node_group (5 example cases)
AWS::EKS::Nodegroup (10 example cases)
shisho-cloud-logo

Build a secure Infrastructure-as-Code

Shisho Cloud helps you fix security issues in your infrastructure as code with auto-generated patches.

scan-now-button
About Us
Contact Us
Docs
© 2021 Flatt Security