Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Zero Trust in EKS - Securing Workload Identity and Communication

AWS Events via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Learn how to implement Zero Trust principles in Amazon EKS environments through this 46-minute conference talk from AWS re:Inforce 2025. Move beyond traditional perimeter-based security models to secure modern Kubernetes workloads using identity-based access controls and secure communication patterns. Discover EKS Pod Identity for streamlined workload identity management, enabling pods to authenticate and access AWS services using fine-grained, identity-based permissions rather than shared credentials. Explore service mesh technologies for establishing secure service-to-service communication within your Kubernetes clusters, implementing encryption and authentication between microservices. Gain practical architectural insights through live demonstrations that showcase real-world patterns for connecting containerized applications to AWS services while maintaining Zero Trust security principles. Master essential security configurations and best practices that enhance your Kubernetes security posture, whether you're new to container security or an experienced practitioner looking to strengthen your EKS deployments with modern Zero Trust approaches.

Syllabus

AWS re:Inforce 2025 - Zero Trust in EKS: Securing workload identity and communication (IAM342)

Taught by

AWS Events

Reviews

Start your review of Zero Trust in EKS - Securing Workload Identity and Communication

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.