One of the most challenging questions in cloud environments is about how secure is my application when its deployed in the public cloud ?
Its no secret that security aspects are much more important in a public cloud than it was in classic environments.
But dont be surprised that many applications even in public cloud dont follow best practice security patterns.
This has several reasons for example time and costs are very high trying to achieve a high security level.
But in fact AWS and Kubernetes offer many options which let you improve your security level without too much effort.
I like to share some of the possibilities that you have when creating a secure AWS EKS cluster.
Author: | Johannes Lechner |
---|---|
Tags: | AWS, EKS, Cloudwatch, Kubernetes, security, guide, networkpolicy, consulting, prevent, cyberdetection, cyberprevention, cyberattack, München, Consulting |
Categories: | devops |
One of the most challenging questions in cloud environments is about how secure is my application when its deployed in the public cloud ?
Its no secret that security aspects are much more important in a public cloud than it was in classic environments.
But dont be surprised that many applications even in public cloud dont follow best practice security patterns.
This has several reasons for example time and costs are very high trying to achieve a high security level.
But in fact AWS and Kubernetes offer many options which let you improve your security level without too much effort.
I like to share some of the possibilities that you have when creating a secure AWS EKS cluster.
Author: | Johannes Lechner |
---|---|
Tags: | AWS, EKS, Cloudwatch, Kubernetes, security, guide, networkpolicy, consulting, prevent, cyberdetection, cyberprevention, cyberattack, München, Consulting |
Categories: | devops |