Securing your clusters

Security best practices

Using security best practices with your EKS Anywhere deployments

Authenticate cluster with AWS IAM Authenticator

Configure AWS IAM Authenticator to authenticate user access to the cluster

Certificate rotation

How to rotate certificates for etcd and control plane nodes

CIS Self-Assessment Guide

CIS Benchmark Self-Assessment Guide for EKS Anywhere clusters