Securing EKS with Teleport!
Managing access to EKS clusters can be fraught with peril if not done correctly. By leveraging Teleport to manage EKS access, you reduce your potential exposure to attacks, add audit trails, and even achieve compliance!
Watch this session with Chintan Sanghavi and Nivathan Somasundharam, where they walk you through how to:
- Manage access to EKS with your SSO provider
- Leverage granular RBAC controls to control and limit access to specific clusters and even pods
- Showcase K8s recording for compliance and auditing