In the first two parts of this tutorial, we discussed:
How to enhance your Pod security in your Kubernetes cluster.
How to harden your Kubernetes network security.
As the third and final part of this tutorial we are going over the authentication, authorization, logging, and auditing of a Kubernetes cluster. Specifically, we will demonstrate some of the best practices in AWS EKS. After reading this tutorial, you will be able to: