Containers
Category: Security, Identity, & Compliance
Managing access to HAQM Elastic Kubernetes Service clusters with X.509 certificates
Introduction Currently, customers are given two main options for end users to access HAQM Elastic Kubernetes Service (HAQM EKS) clusters when using utilities like kubectl – AWS Identity and Access Management (AWS IAM), or OpenID Connect (OIDC). However, some customers leverage X.509 certificates to authenticate their end-users for access to HAQM EKS clusters, especially those […]
HAQM ECR in Multi-Account and Multi-Region Architectures
Introduction HAQM Elastic Container Registry (HAQM ECR) is a fully managed container registry offering high-performance hosting, so you can reliably deploy application images and artifacts anywhere. It stores container images and artifacts that deploy application workloads across AWS services as well as non-AWS environments. HAQM ECR is a regional service, where each Region in each […]
Securing HAQM Elastic Container Service applications using Application Load Balancer and HAQM Cognito
Introduction Designing and maintaining secure user management, authentication and other related features for applications is not an easy task. HAQM Cognito takes care of this work, which allows developers to focus on building the core business logic of the application. HAQM Cognito provides user management, authentication, and authorization for applications where users can log in […]
Building STIG-compliant AMIs for HAQM EKS
As more organizations required to run hardened virtual machines to increase security to meet the internal compliance adopt Kubernetes, there is a need for hardened HAQM Machine Images (AMIs) that work with HAQM Elastic Kubernetes Service (HAQM EKS). There are multiple options to choose from. One solution is to use Bottlerocket, a special-purpose OS from […]
A quick path to HAQM EKS single sign-on using AWS SSO
With the rapid growth of software as a service (SaaS) and cloud adoption, identity is the new security perimeter. AWS Identity and Access Management (IAM) and Kubernetes role-based access control (RBAC) provide the tools to build a strong least-privilege security posture. Single sign-on (SSO) uses federation with a central identity provider (IdP) to improve security by allowing […]
Using IAM database authentication with workloads running on HAQM EKS
HAQM Elastic Kubernetes Service (HAQM EKS) is a managed service that you can use to run Kubernetes on AWS without needing to install, operate, and maintain your own Kubernetes control plane or nodes. When running containerized workloads on HAQM EKS, it is common to store the stateful parts of the application outside of the Kubernetes […]
Container scanning updates in HAQM ECR private registries using HAQM Inspector
We announced a new HAQM Inspector last week at re:Invent 2021 with improved vulnerability management for cloud workloads. HAQM Inspector is a service used by organizations of all sizes to automate security assessment and management at scale. For HAQM Elastic Container Registry (HAQM ECR) private registry customers, this announcement brings updates, enhancements, and integrations to […]
How to use Application Load Balancer and HAQM Cognito to authenticate users for your Kubernetes web apps
This post describes how to use HAQM Cognito to authenticate users for web apps running in an HAQM Elastic Kubernetes Services (HAQM EKS) cluster. Behind any identity management system resides a complex network of systems meant to keep data and services secure. These systems handle functions such as directory services, access management, identity authentication, and […]
Managing ROSA subscriptions at scale
One aspect of operating applications at scale is managing software in a manner that provides control as well as caters for self service and agility. As the modernization of applications and overall business processes takes place, agility requirements drive the need for teams to have access to the tools they require. How does a large-scale […]
Automating image compliance for HAQM ECS and HAQM EKS using HAQM Elastic Container Registry (ECR) and AWS Security Hub
Introduction As containers move to cloud native production environments, DevOps and security teams increasingly look to deploy DevSecOps pipelines that provide automated real-time visibility into container activity, restrict container access to host and network resources and detect and prevent exploits and attacks on running containers. In this blog post, we implement a solution that demonstrates […]