Best Practices for End-to-End Encryption in AWS EKS

0
5
Asked By CloudyDayz123 On

I'm exploring best practices for implementing end-to-end encryption in my AWS EKS cluster. I plan to utilize the AWS/k8s Gateway API Controller and VPC Lattice for managing incoming connections at the cluster/private level. Should I incorporate a Network Load Balancer (NLB) that targets the VPC Lattice service, or are there better networking options available? I've noticed that achieving end-to-end encryption with an Application Load Balancer (ALB) might have some limitations. Another alternative I'm considering is having a public Nginx pod that a Route53 record can redirect to. What recommendations do you have?

1 Answer

Answered By TechieTom82 On

Just a heads up, terminating TLS with a load balancer can compromise the 'end-to-end' concept. If your TLS setup is solid, you should be good to go. But keep in mind, the NLB might seem a bit hefty for what you're planning, especially if you're looking for a lighter approach!

DataGuardian99 -

Yeah, I get that! From what I’ve seen regarding compliance (like HIPAA), using an ALB to decrypt and then re-encrypt for the instances isn’t perfect but often considered good enough. I guess you're right about the NLB, though—it can feel overkill. Just trying to find a more efficient solution!

Related Questions

LEAVE A REPLY

Please enter your comment!
Please enter your name here

This site uses Akismet to reduce spam. Learn how your comment data is processed.