web
You’re offline. This is a read only version of the page.
close

  • Search
  • Support
    • For Home
    • For Business
  • English
    • Bahasa Indonesia (Indonesian)
    • Dansk (Danish)
    • Deutsch (German)
    • English (Australia)
    • English (US)
    • Español (Spanish)
    • Français (French)
    • Français Canadien
      (Canadian French)
    • Italiano (Italian)
    • Nederlands (Dutch)
    • Norsk (Norwegian)
    • Polski (Polish)
    • Português - Brasil
      (Portuguese - Brazil)
    • Português - Portugal
      (Portuguese - Portugal)
    • Svenska (Swedish)
    • ภาษาไทย (Thai)
    • Tiếng Việt (Vietnamese)
    • Türkçe (Turkish)
    • Čeština (Czech)
    • Ελληνικά (Greek)
    • Български (Bulgarian)
    • Русский (Russian)
    • עברית (Hebrew)
    • اللغة العربية (Arabic)
    • 日本語 (Japanese)
    • 简体中文
      (Simplified Chinese)
    • 繁體中文
      (Traditional Chinese)
    • 繁體中文 HK
      (Traditional Chinese)
    • 한국어 (Korean)
  • Home
  • Online Help Center
  • trend-vision-one-eks-1-4-0-recommendations
Print

Amazon Elastic Kubernetes (EKS) 1.4.0 recommendations

Views:
Related information
  • 2.1.1 - Enable audit logs (automated)
  • 3.2.1 - Ensure that anonymous authentication is not enabled (automated)
  • 3.2.2 - Ensure that the authorization-mode argument is not set to AlwaysAllow (automated)
  • 3.2.3 - Ensure that a Client CA file is configured (automated)
  • 3.2.5 - Ensure that the --streaming-connection-idle-timeout argument is not set to 0 (automated)
  • 3.2.6 - Ensure that the --make-iptables-util-chains argument is set to true (automated)
  • 3.2.7 - Ensure that the --eventRecordQPS argument is set to 0 or a level which ensures appropriate event capture (automated)
  • 3.2.9 - Ensure that the RotateKubeletServerCertificate argument is set to true (automated)
  • 4.1.3 - Minimize wildcard use in Roles and ClusterRoles (automated)
  • 5.1.1 - Ensure Image Vulnerability Scanning using Amazon ECR or a third-party provider (automated)
  • 5.4.1 - Restrict Access to the Control Plane Endpoint (automated)
  • 5.4.2 Ensure clusters are created with Private Endpoint Enabled and Public Access Disabled (Automated)
  • 5.4.3 Ensure clusters are created with Private Nodes (Automated)
  • 5.4.4 Ensure Network Policy is Enabled and set as appropriate (Automated)
Online Help Center



© Trend Micro Incorporated. All rights reserved.
Table of Contents
< Back to What’s New
Home / XDR and Management Platforms / Trend Vision One /
Title
Content
The page you're looking for can't be found or is under maintenance
Try again later or go back to the previous page
Go back
Was this article helpful?
Table of Contents
Close