Security

Securing your clusters

Security best practices

Using security best practices with your EKS Anywhere deployments

Authenticate cluster with AWS IAM Authenticator

Configure AWS IAM Authenticator to authenticate user access to the cluster

CIS Self-Assessment Guide

CIS Benchmark Self-Assessment Guide for EKS Anywhere clusters