Ensure that the permissions defined for the worker node IAM role are not too permissive. In order to implement the Principle of Least Privilege (also known as the principle of least authority, i.e. the security concept of providing every identity, process, or system the minimal set of permissions required to perform successfully its tasks), the IAM role associated with your Amazon EKS cluster worker nodes should use the following managed policies only: "AmazonEKSWorkerNodePolicy" and "AmazonEC2ContainerRegistryReadOnly".
excellence
The IAM role assigned to a worker node empowers the kubelet, which operates on the node, to interact with various APIs on your behalf. This role is used to securely manage access to the cluster resources, provide fine-grained permissions for worker nodes, and simplify administration by centralizing access management and eliminating the need for individual credentials on each node. Providing the right permissions to the worker node IAM role will significantly reduce the risk of unauthorized access to your Amazon EKS cluster resources.
Audit
To determine if your Amazon EKS cluster node groups are using appropriate permissions for worker nodes, perform the following actions:
Remediation / Resolution
To ensure that your Amazon EKS cluster node groups are using appropriate permissions for worker nodes, perform the following actions:
References
- AWS Documentation
- Amazon EKS FAQs
- Amazon EKS clusters
- Creating a managed node group
- Amazon EKS node IAM role
- AmazonEKSWorkerNodePolicy
- AmazonEC2ContainerRegistryReadOnly
- AWS Command Line Interface (CLI) Documentation
- list-clusters
- list-nodegroups
- describe-nodegroup
- list-attached-role-policies
- list-role-policies
- detach-role-policy
- delete-role-policy