all InfoSec news
Attacking and securing cloud identities in managed Kubernetes part 1: Amazon EKS
Datadog Security Labs securitylabs.datadoghq.com
Introduction
Amazon Elastic Kubernetes Service (EKS) is a popular way to run managed Kubernetes clusters in the cloud. In this post, we'll review how identity and access management (IAM) works in EKS, both for humans and workloads. Then, we'll deep-dive into various attack vectors that allow an attacker to pivot from an EKS cluster to an AWS account, potentially compromising the full cloud environment.
This blog post contains several sections. Some are learning focused (📙), others are attacker focused (😈), …
access access management amazon attack attack vectors cloud clusters dive eks elastic humans iam identities identity identity and access identity and access management introduction kubernetes kubernetes clusters managed management popular review run service workloads