Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Restricting access to the IMDS and Amazon EC2 instance profile credentials #62

Closed
ib-ak opened this issue Mar 15, 2021 · 0 comments · Fixed by #63
Closed

Restricting access to the IMDS and Amazon EC2 instance profile credentials #62

ib-ak opened this issue Mar 15, 2021 · 0 comments · Fixed by #63

Comments

@ib-ak
Copy link

ib-ak commented Mar 15, 2021

Have a question? Please checkout our Slack Community or visit our Slack Archive.

Slack Community

Describe the Feature

Restricting access to the IMDS and Amazon EC2 instance profile credentials

Expected Behavior

There should be an option to disable IMDS for node groups

Use Case

Amazon EKS security best practices
https://docs.aws.amazon.com/eks/latest/userguide/best-practices-security.html

Describe Ideal Solution

Managed nodes with a custom launch template
Set the following settings in the launch template's Advanced details:

Metadata accessible – Enabled
Metadata version – V2 only (token required)
Metadata response hop limit – 1

Alternatives Considered

None

Additional Context

Add any other context or screenshots about the feature request here.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging a pull request may close this issue.

1 participant