EKS 漏洞列表
共找到 9 个与 EKS 相关的漏洞
📅 加载漏洞趋势中...
-
eks-aws-managed-iam-policy: Use AWS-managed policy to manage AWS resources POC
Ensure that all Amazon EKS clusters use the "AmazonEKSClusterPolicy" managed policy to efficiently manage the resources that you use with the EKS service. This policy grants Kubernetes the necessary permissions to handle resources on your behalf. -
eks-cluster-logging: Kubernetes Cluster Logging POC
Ensure that your Amazon Elastic Kubernetes Service (EKS) clusters have control plane logs enabled to publish API, audit, controller manager, scheduler and authenticator logs to AWS CloudWatch Logs. -
eks-endpoint-access: EKS Cluster Endpoint Public Access POC
Ensure that your Amazon EKS cluster's Kubernetes API server endpoint is not publicly accessible from the Internet in order to avoid exposing private data and minimizing security risks. -
eks-iam-managed-policy-networking: Use AWS-managed policy to Manage Networking Resources POC
Ensure that all Amazon EKS cluster node groups use the "AmazonEKS_CNI_Policy" managed policy to manage cloud networking resources effectively. This policy provides the necessary permissions to the Amazon VPC CNI Plugin for managing network interfaces. -
eks-kubernetes-secrets-encryption: EKS Kubernetes Secrets not Encrypted POC
Ensure that your Amazon Elastic Kubernetes Service (EKS) clusters have encryption enabled for Kubernetes secrets using AWS KMS Customer Master Keys (CMKs). This is a security best practice for protecting sensitive data stored in Kubernetes secrets. -
eks-logging-kubes-api-calls: Enable CloudTrail Logging for Kubernetes API Calls POC
Ensure that CloudTrail logging is enabled for Amazon Elastic Kubernetes Service (EKS) clusters in order to record all Kubernetes API calls. Amazon CloudTrail records and documents all activities performed on EKS clusters. -
eks-long-running-pods: EKS Long Running Pods POC
Ensure that Amazon Elastic Kubernetes Service (EKS) clusters do not have pods running for more than 30 days. Long-running pods may indicate stale deployments, potential security risks, or resource inefficiencies. -
eks-managed-policy-ecr-access: Use AWS-managed policy to access Amazon ECR Repositories POC
Ensure that all EKS cluster node groups use the "AmazonEC2ContainerRegistryReadOnly" managed policy to access Amazon ECR repositories. This policy provides read-only access to Amazon EC2 Container Registry (ECR) repositories. -
eks-node-group-remote-access: EKS Node Group Remote Access Configuration POC
Ensure that Amazon EKS node groups are configured with appropriate remote access settings to maintain security and enable necessary administrative access.