Ensure EKS Cluster has Authenticator logging enabled

Authenticator logging is crucial to have enabled in order have full insight into who has interacted or made changes with the Kubernetes cluster via the api. For this reason having audit logging enabled is considered a security best practice to and should be enabled. Ensuring this is enabled will help you with PCI-DSS, HIPPA and GDPR compliance.

Audit & Remediation

 

 

  • Select the EKS cluster in order to go into the Cluster configuration page.
  • Select the Logging tab and see if the Authenticator is currently set to Enabled under the Control Plane Logging section.

 

 

  • Select the buttonManage Logging button.
  • Select Authenticator and move to Enabled

 

 

  • Repeat the outlined steps for each region that you have ECR repositories in.
  • Repeat the outlined steps for each AWS account that you have.
See all of your AWS EC2 Instances in a single place!

Do you want to see all of your AWS EC2 Instances in once place for all regions and all accounts?
Login to our online demo to see exactly what this looks like.
demo.intelligentdiscovery.io

 

Other Key Features

Inventory

Consolidate your inventory management with consistent and frequent security logs, inventories, and change logs. Dashboard reporting for extensive analytical value.

learn more +

Cost & Usage

Access consolidated capacity, cost, and volume tools in a scaling environment without impacting production or breaking the bank.

learn more +