0% found this document useful (0 votes)
8 views11 pages

AWS EKS Access Patterns Using Access Entries

The document outlines a video tutorial on AWS EKS Access Management, covering topics such as default access behavior, EKS access entries, and granting access via IAM users. It emphasizes best practices for using IAM roles and groups, as well as how to assume IAM roles for secure EKS access. The video concludes with a summary of best practices for maintaining security in EKS access management.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views11 pages

AWS EKS Access Patterns Using Access Entries

The document outlines a video tutorial on AWS EKS Access Management, covering topics such as default access behavior, EKS access entries, and granting access via IAM users. It emphasizes best practices for using IAM roles and groups, as well as how to assume IAM roles for secure EKS access. The video concludes with a summary of best practices for maintaining security in EKS access management.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 11

Default

IAM USER
IAM ROLE
00:00 – Introduction to AWS EKS Access Management

01:37 – Default Access Behavior in EKS

04:30 – What are EKS Access Entries?

06:41 – Granting EKS Access via IAM Users

08:55 – Best Practices: Using IAM Roles & Groups

12:47 – Assuming IAM Roles for EKS Access

15:55 – Summary & Best Practices for Secure EKS Access

https://www.youtube.com/watch?v=dJljyWT38wU

You might also like