Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Learn how to implement Zero Trust principles in Amazon EKS environments through this 46-minute conference talk from AWS re:Inforce 2025. Move beyond traditional perimeter-based security models to secure modern Kubernetes workloads using identity-based access controls and secure communication patterns. Discover EKS Pod Identity for streamlined workload identity management, enabling pods to authenticate and access AWS services using fine-grained, identity-based permissions rather than shared credentials. Explore service mesh technologies for establishing secure service-to-service communication within your Kubernetes clusters, implementing encryption and authentication between microservices. Gain practical architectural insights through live demonstrations that showcase real-world patterns for connecting containerized applications to AWS services while maintaining Zero Trust security principles. Master essential security configurations and best practices that enhance your Kubernetes security posture, whether you're new to container security or an experienced practitioner looking to strengthen your EKS deployments with modern Zero Trust approaches.
Syllabus
AWS re:Inforce 2025 - Zero Trust in EKS: Securing workload identity and communication (IAM342)
Taught by
AWS Events