-
Notifications
You must be signed in to change notification settings - Fork 9
Open
Description
Summary
This issue proposes Phase 1 support for Amazon EKS (Elastic Kubernetes Service) infrastructure checks in ci_lambda_checks. This would allow basic security, compliance, and configuration evaluations for EKS resources in a manner similar to current EC2 resource monitoring.
Background
Currently, the project supports only traditional AWS EC2 resource types (instances, VPCs, security groups, subnets, etc.). AWS EKS is widely used, so extending these checks to EKS infrastructure provides greater security coverage in AWS environments.
Scope (Phase 1)
- Add support for infrastructure-level checks on:
- EKS Clusters (AWS::EKS::Cluster)
- EKS Managed Node Groups (AWS::EKS::Nodegroup)
- Use AWS Config events as the evaluation trigger (like for EC2)
- Only cluster and node group configuration checks; no pod/container-level checks yet.
Proposed Implementation
1. Update config.js with Two New Check Configurations
- eksInfrastructure (checks cluster logging, version, endpoint access, secrets encryption)
- eksNodeGroup (checks AMI type, update configuration, required tags, scaling configuration)
2. Update utilities/assets.js for EKS Asset Type Mappings
- assetType for:
AWS::EKS::Cluster→eks-clusterAWS::EKS::Nodegroup→eks-nodegroupAWS::EKS::FargateProfile→eks-fargate
- Add a helper for querying EKS clusters
3. Add New EKS Check Modules
checks/eksInfrastructure.js: Handles cluster-level checks as proposedchecks/eksNodeGroup.js: Handles node group-level checks as proposed
4. Update checks/awsConfigRules.js
- Add EKS-related resource type mappings for cluster, node group, fargate
5. New Documentation
- Add a file (
README_EKS.md) documenting EKS checks, policies, and configuration
Benefits
- Expands ci_lambda_checks coverage to modern Kubernetes infrastructure on AWS
- Leverages existing AWS Config event-driven architecture
- Security/compliance parity with EC2 resource evaluations at the infrastructure level
- Checks are disabled by default; opt in as needed
Testing & Compatibility
- No breaking changes; existing checks and flows remain unaffected
- EKS checks must be enabled and AWS Config must record EKS resources
- See
README_EKS.mdfor policy details and test guidance
Full Proposed Changes
The full proposed code and documentation are available and ready to integrate. Please comment if you have feedback or would like review before I branch the code, make the changes, and a pull request is created for review!
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
No labels