55 examples and best practices for AWS Amazon EKS, including AWS Amazon EKS Addon and AWS Amazon EKS Cluster.
aws_eks_cluster (5 example cases)
4 best security practices
- Ensure public access for AWS EKS cluster endpoint is disabled
- Ensure a CIDR range for AWS EKS cluster endpoint access is restricted enough
- Ensure to enable control plane logging of your EKS cluster
- Ensure to enable envelope encryption of EKS secrets
AWS::EKS::Cluster (10 example cases)