
The baseline includes tests that must be executed against the Kubernetes API and tests that must be executed against the underlying nodes over SSH. The following tests are also skipped, because they are not applicable or enforce settings that might make the cluster unstable. eks-cis-cluster-baseline InSpec profile to validate the secure configuration of AWS EKS, against CIS 's CIS Amazon Elastic Kubernetes Service (EKS) Benchmark version 1.0.1 (Cluster requirements). If you created your EKS Anywhere cluster with stacked etcd configuration, you can apply the stacked etcd Job YAMLĮnsure that the etcd pod specification file permissions are set to 644 or more restrictiveĮnsure that the etcd pod specification file ownership is set to root:rootĮnsure that the etcd data directory permissions are set to 700 or more restrictiveĮnsure that the etcd data directory ownership is set to etcd:etcd The new Amazon EKS Workshop is now available at. Kube-bench currently does not support unstacked etcd topology (which is the default for EKS Anywhere), so the following checks are skipped in the default kube-bench Job YAML. intermediate cis eks benchmark kube-bench This workshop has been deprecated and archived. This runs the kube-bench tests on a Pod on the cluster, and the logs of the Pod provide the test results. The ideal way to run the benchmark tests on your EKS Anywhere cluster is to apply the Kube-bench Job YAMLs You can verify the security posture of your EKS Anywhere cluster by using a tool called kube-bench This guide will walk through the various controls and provide updated example commands to audit compliance in EKS Anywhere clusters. The CIS Benchmark self-assessment guide serves to help EKS Anywhere users evaluate the level of security of the hardened cluster configuration against Kubernetes benchmark controls from the Center for Information Security (CIS). CIS Benchmark Self-Assessment Guide for EKS Anywhere clusters.


anywhere generate support-bundle-config.Credential Provider Package with IAM Roles Anywhere.Secure connectivity with CNI and Network Policy.
CIS BENCHMARK FOR AWS EKS UPGRADE
Upgrade vSphere, CloudStack, Nutanix, or Snow cluster.
