Using Custom Policies to Manage Compliance in Amazon EKS Collections

Authors

  • Babulal Shaik Cloud Solutions Architect at Amazon Web Services, USA Author

Keywords:

Amazon EKS, compliance, Kubernetes

Abstract

Using convention rules to automate compliance in Amazon Elastic Kubernetes Service collections is essential for streamlining Kubernetes governance while adhering to security & their legal requirements. The increasing dynamic nature and complexities of Kubernetes deployments makes manual compliance management daunting.  Elastic Kubernetes Service makes Kubernetes operations easier, but also in order to satisfy certain industrial needs or organizational, adaptations are sometimes required. By ensuring that infractions are discovered early, integrating compliance automation into CI/CD pipelines expedites growth & deployment. Businesses may enforce security best practices, automate compliance checks & stop misconfigurations in real time by putting be spoke rules into place. This guarantees continuous cluster rule enforcement while lowering manual labor and mistake rates.  Automated tools provide visibility, enabling teams to proactively monitor compliance status & resolve their problems. This method allows Kubernetes settings to grow safely while being adaptable to shifting security & their legal requirements. In order to maintain the security, efficiency & compliance of their EKS clusters, enterprises may improve their security posture, save operating costs, and handle cloud-native transformations with confidence by automating compliance. Effective definition, implementation, and monitoring of these rules are made possible by teams using tools such as Kubernetes admission controllers & Open Policy Agent (OPA).

References

1. Wilkins, M. (2019). Learning Amazon Web Services (AWS): A hands-on guide to the fundamentals of AWS Cloud. Addison-Wesley Professional.

2. Ganesan, P. (2020). DevOps Automation for Cloud Native Distributed Applications. Journal of Scientific and Engineering Research, 7(2), 342-347.

3. Sayfan, G. (2018). Mastering Kubernetes: Master the art of container management by using the power of Kubernetes. Packt Publishing Ltd.

4. Kelley, R., Antu, A. D., Kumar, A., & Xie, B. (2020, October). Choosing the Right Compute Resources in the Cloud: An analysis of the compute services offered by Amazon, Microsoft and Google. In 2020 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC) (pp. 214-223). IEEE.

5. Menga, J. (2018). Docker on Amazon Web Services: Build, deploy, and manage your container applications at scale. Packt Publishing Ltd.

6. Truyen, E., Kratzke, N., Van Landuyt, D., Lagaisse, B., & Joosen, W. (2020). Managing feature compatibility in Kubernetes: Vendor comparison and analysis. Ieee Access, 8, 228420-228439.

7. Tønnesland, T. A. (2013). Evaluation of a Private Cloud for Higher Education (Master's thesis, Institutt for datateknikk og informasjonsvitenskap).

8. Naruchitparames, J. (2011). Enhancing the privacy of data communications within information-sensitive systems (Doctoral dissertation).

9. Kartalopoulos, S. V. (2009). Security of information and communication networks (Vol. 15). John Wiley & Sons.

10. Katari, A. Conflict Resolution Strategies in Financial Data Replication Systems.

11. Gade, K. R. (2020). Data Analytics: Data Privacy, Data Ethics, Data Monetization. MZ Computing Journal, 1(1).

12. da Silva, J. P. A. (2019). Service Modelling and End-to-End Orchestration in 5G Networks.

13. Reidenberg, J. R. (1997). Lex informatica: The formulation of information policy rules through technology. Tex. L. Rev., 76, 553.

14. Borrás, S., & Edquist, C. (2013). The choice of innovation policy instruments. Technological forecasting and social change, 80(8), 1513-1522.

15. Easterly, W., & Rebelo, S. (1993). Fiscal policy and economic growth. Journal of monetary economics, 32(3), 417-458.

16. Thumburu, S. K. R. (2020). Integrating SAP with EDI: Strategies and Insights. MZ Computing Journal, 1(1).

17. Gade, K. R. (2020). Data Mesh Architecture: A Scalable and Resilient Approach to Data Management. Innovative Computer Sciences Journal, 6(1).

18. Katari, A. Conflict Resolution Strategies in Financial Data Replication Systems.

19. Komandla, V. Enhancing Security and Fraud Prevention in Fintech: Comprehensive Strategies for Secure Online Account Opening.

20. Thumburu, S. K. R. (2020). Enhancing Data Compliance in EDI Transactions. Innovative Computer Sciences Journal, 6(1).

21. Thumburu, S. K. R. (2020). Interfacing Legacy Systems with Modern EDI Solutions: Strategies and Techniques. MZ Computing Journal, 1(1).

22. Gade, K. R. (2020). Data Analytics: Data Privacy, Data Ethics, Data Monetization. MZ Computing Journal, 1(1).

23. Katari, A., & Rallabhandi, R. S. DELTA LAKE IN FINTECH: ENHANCING DATA LAKE RELIABILITY WITH ACID TRANSACTIONS.

Published

11-01-2021

How to Cite

Using Custom Policies to Manage Compliance in Amazon EKS Collections. (2021). Journal of Artificial Intelligence Research and Applications, 1(1), 587-610. https://jairajournal.org/index.php/publication/article/view/45