INFO
Source
CloudSploit
ID
privilege-analysis

Privilege Analysis

Ensures no EKS cluster available in your AWS account is overly-permissive.

Overly-permissive EKS clusters can expose your infrastructure to unauthorized access or accidental misconfigurations. Regular analysis of permissions helps maintain a secure cluster setup.

Audit the IAM roles and policies associated with your EKS cluster. Restrict access to the minimum necessary permissions and configure security groups and endpoint access control appropriately.