Skip to content

Commit 804bae4

Browse files
Update README.md
1 parent 1fb8179 commit 804bae4

File tree

1 file changed

+90
-0
lines changed

1 file changed

+90
-0
lines changed

README.md

Lines changed: 90 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -8,6 +8,9 @@
88
- [Plan Your Deployment](#plan-your-deployment)
99
- [Cost](#cost)
1010
- [Sample Cost Table](#sample-cost-table)
11+
- [Security](#security)
12+
- [Supported AWS regions](#supported-aws-regions)
13+
- [Service Quotas](#service-quotas)
1114
- [Third party dependencies disclaimer](#third-party-dependencies-disclaimer)
1215
- [Quick Start Guide](#quick-start-guide)
1316
- [Important Setup Instructions](#️-important-setup-instructions)
@@ -112,6 +115,93 @@ The following table provides a sample cost breakdown for deploying this guidance
112115

113116
For a more accurate estimate based on your specific configuration and usage patterns, we recommend using the [AWS Pricing Calculator](https://calculator.aws).
114117

118+
## Security
119+
120+
When you build systems on AWS infrastructure, security responsibilities are shared between you and AWS.
121+
This [shared responsibility model](https://aws.amazon.com/compliance/shared-responsibility-model/) reduces your operational burden because AWS operates, manages,
122+
and controls the components including the host operating system, the virtualization layer, and the physical security of the facilities in which the services operate.
123+
For more information about AWS security, visit [AWS Cloud Security](http://aws.amazon.com/security/).
124+
125+
This guidance implements several security best practices and AWS services to enhance the security posture of your EKS Workload Ready Cluster. Here are the key security components and considerations:
126+
127+
### Identity and Access Management (IAM)
128+
129+
- **IAM Roles**: The architecture uses predefined IAM roles (Cluster Admin, Admin, Edit, Read) to manage access to the EKS cluster resources.
130+
This follows the principle of least privilege, ensuring users and services have only the permissions necessary to perform their tasks.
131+
- **EKS Managed Node Groups**: These use IAM roles with specific permissions required for nodes to join the cluster and for pods to access AWS services.
132+
133+
### Network Security
134+
135+
- **Amazon VPC**: The EKS cluster is deployed within a custom VPC with public and private subnets across multiple Availability Zones, providing network isolation.
136+
- **Security Groups**: Although not explicitly shown in the diagram, security groups are typically used to control inbound and outbound traffic to EC2 instances and other resources within the VPC.
137+
- **NAT Gateways**: Deployed in public subnets to allow outbound internet access for resources in private subnets while preventing inbound access from the internet.
138+
139+
### Data Protection
140+
141+
- **Amazon EBS Encryption**: EBS volumes used by EC2 instances are typically encrypted to protect data at rest.
142+
- **AWS Key Management Service (KMS)**: Used for managing encryption keys for various services, including EBS volume encryption.
143+
144+
### Kubernetes-specific Security
145+
146+
- **Kubernetes RBAC**: Role-Based Access Control is implemented within the EKS cluster to manage fine-grained access to Kubernetes resources.
147+
- **AWS Certificate Manager**: Integrated to manage SSL/TLS certificates for secure communication within the cluster.
148+
149+
### Monitoring and Logging
150+
151+
- **Amazon CloudWatch**: Used for monitoring and logging of AWS resources and applications running on the EKS cluster.
152+
- **Amazon Managed Grafana and Prometheus**: Provide additional monitoring and observability capabilities, helping to detect and respond to security events.
153+
154+
### Container Security
155+
156+
- **Amazon ECR**: Stores container images in a secure, encrypted repository. It includes vulnerability scanning to identify security issues in your container images.
157+
158+
### Secrets Management
159+
160+
- **AWS Secrets Manager**: While not explicitly shown in the diagram, it's commonly used to securely store and manage sensitive information such as database credentials, API keys, and other secrets used by applications running on EKS.
161+
162+
### Additional Security Considerations
163+
164+
- Regularly update and patch EKS clusters, worker nodes, and workload container images.
165+
- Implement network policies to control pod-to-pod communication within the cluster.
166+
- Use Pod Security Policies or Pod Security Standards to enforce security best practices for pods.
167+
- Implement proper logging and auditing mechanisms for both AWS and Kubernetes resources.
168+
- Regularly review and rotate IAM and Kubernetes RBAC permissions.
169+
170+
## Supported AWS Regions
171+
172+
Guidance for Scalable Model Inference and Agentic AI on Amazon EKS is supported in the following AWS Regions:
173+
174+
| Region Name | Region Code |
175+
|-------------|-------------|
176+
| US East (N. Virginia) | us-east-1 |
177+
| US East (Ohio) | us-east-2 |
178+
| US West (Oregon) | us-west-2 |
179+
| Asia Pacific (Mumbai) | ap-south-1 |
180+
| Asia Pacific (Seoul) | ap-northeast-2 |
181+
| Asia Pacific (Singapore) | ap-southeast-1 |
182+
| Asia Pacific (Sydney) | ap-southeast-2 |
183+
| Asia Pacific (Tokyo) | ap-northeast-1 |
184+
| Europe (Frankfurt) | eu-central-1 |
185+
| Europe (Ireland) | eu-west-1 |
186+
| Europe (London) | eu-west-2 |
187+
| Europe (Paris) | eu-west-3 |
188+
| Europe (Stockholm) | eu-north-1 |
189+
| South America (São Paulo) | sa-east-1 |
190+
191+
## Service Quotas
192+
193+
Service quotas, also referred to as limits, are the maximum number of service resources or operations for your AWS account.
194+
195+
### Quotas for AWS services in this Guidance
196+
197+
Make sure you have sufficient quota for each of the AWS services implemented in this solution (see [AWS Services in this guidance](#aws-services-in-this-Guidance)).
198+
For more information, see [AWS service quotas](https://docs.aws.amazon.com/general/latest/gr/aws_service_limits.html){:target="_blank"}.
199+
200+
To view the service quotas for all AWS services in the documentation without switching pages, view the information in the
201+
[Service endpoints and quotas](https://docs.aws.amazon.com/general/latest/gr/aws-general.pdf#aws-service-information){:target="_blank"}
202+
page in the PDF format.
203+
204+
115205
## Third-Party Dependencies Disclaimer
116206

117207
This sample code utilizes various third-party packages, modules, models, and datasets, including but not limited to:

0 commit comments

Comments
 (0)