Container Security Maturity Model – Understand your security needs at every stage of the container journey Download eBook
{ .link_text }}

Posts under Kubernetes Monitoring

AWS EKS Monitoring Best Practices for Stability and Security

AWS EKS Monitoring Best Practices for Stability and Security

This is part 5 of our 5-part AWS Elastic Kubernetes Service (EKS) security blog series. Don’t forget to check out our previous blog posts in the series: Part 1 - Guide to Designing EKS Clusters for Better Security Part 2 - Securing EKS Cluster Add-ons: Dashboard, Fargate, EC2 components, and more Part 3 - EKS networking best practices Part 4 - EKS Runtime Security Best Practices EKS leaves a large portion of the responsibility for applying security updates and upgrading Kubernetes versions, and for detecting and replacing failed nodes, to the user.