IRSA Architecture in Amazon EKS: Solving a Real Access Problem

IRSA Architecture in Amazon EKS: Solving a Real Access Problem

Introduction When using Kubernetes, such as Amazon EKS, apps rarely run on their own. Most workloads require interaction with AWS services such as S3, DynamoDB, or Secrets Manager. At first glance, it looks like giving that access is easy. In practice, it quickly becomes a very important security and design issue. The problem isn’t just
Securing CI/CD Pipelines with GitHub OIDC: Eliminating Long-Lived AWS Credentials

Securing CI/CD Pipelines with GitHub OIDC: Eliminating Long-Lived AWS Credentials

I did what most of us do when we first wire up CI/CD for a project. I made an IAM user. access keys that were generated. I put them in GitHub Secrets. The pipeline operated flawlessly. The pipeline could: There were no issues with functionality. However, there was a problem with security. The Problem with