Amazon EKS ensures a secure, scalable, and managed Kubernetes environment with security patches automatically applied to your cluster’s control plane. However, containerized workloads running in EKS are still at risk of potential security threats and vulnerabilities in your AWS environment. Therefore, users need to deploy container security, runtime threat defense, and observability and troubleshooting capabilities to handle new vulnerabilities and risks at the workload level in Amazon EKS.
In this AWS and Tigera webinar, learn about seven security best practices used by Amazon EKS users to secure containerized workloads in EKS.
Get updates on blog posts, workshops, certification programs, new releases, and more!