|
8 | 8 | - [Plan Your Deployment](#plan-your-deployment) |
9 | 9 | - [Cost](#cost) |
10 | 10 | - [Sample Cost Table](#sample-cost-table) |
| 11 | + - [Security](#security) |
| 12 | + - [Supported AWS regions](#supported-aws-regions) |
| 13 | + - [Service Quotas](#service-quotas) |
11 | 14 | - [Third party dependencies disclaimer](#third-party-dependencies-disclaimer) |
12 | 15 | - [Quick Start Guide](#quick-start-guide) |
13 | 16 | - [Important Setup Instructions](#️-important-setup-instructions) |
@@ -112,6 +115,93 @@ The following table provides a sample cost breakdown for deploying this guidance |
112 | 115 |
|
113 | 116 | For a more accurate estimate based on your specific configuration and usage patterns, we recommend using the [AWS Pricing Calculator](https://calculator.aws). |
114 | 117 |
|
| 118 | +## Security |
| 119 | + |
| 120 | +When you build systems on AWS infrastructure, security responsibilities are shared between you and AWS. |
| 121 | +This [shared responsibility model](https://aws.amazon.com/compliance/shared-responsibility-model/) reduces your operational burden because AWS operates, manages, |
| 122 | +and controls the components including the host operating system, the virtualization layer, and the physical security of the facilities in which the services operate. |
| 123 | +For more information about AWS security, visit [AWS Cloud Security](http://aws.amazon.com/security/). |
| 124 | + |
| 125 | +This guidance implements several security best practices and AWS services to enhance the security posture of your EKS Workload Ready Cluster. Here are the key security components and considerations: |
| 126 | + |
| 127 | +### Identity and Access Management (IAM) |
| 128 | + |
| 129 | +- **IAM Roles**: The architecture uses predefined IAM roles (Cluster Admin, Admin, Edit, Read) to manage access to the EKS cluster resources. |
| 130 | +This follows the principle of least privilege, ensuring users and services have only the permissions necessary to perform their tasks. |
| 131 | +- **EKS Managed Node Groups**: These use IAM roles with specific permissions required for nodes to join the cluster and for pods to access AWS services. |
| 132 | + |
| 133 | +### Network Security |
| 134 | + |
| 135 | +- **Amazon VPC**: The EKS cluster is deployed within a custom VPC with public and private subnets across multiple Availability Zones, providing network isolation. |
| 136 | +- **Security Groups**: Although not explicitly shown in the diagram, security groups are typically used to control inbound and outbound traffic to EC2 instances and other resources within the VPC. |
| 137 | +- **NAT Gateways**: Deployed in public subnets to allow outbound internet access for resources in private subnets while preventing inbound access from the internet. |
| 138 | + |
| 139 | +### Data Protection |
| 140 | + |
| 141 | +- **Amazon EBS Encryption**: EBS volumes used by EC2 instances are typically encrypted to protect data at rest. |
| 142 | +- **AWS Key Management Service (KMS)**: Used for managing encryption keys for various services, including EBS volume encryption. |
| 143 | + |
| 144 | +### Kubernetes-specific Security |
| 145 | + |
| 146 | +- **Kubernetes RBAC**: Role-Based Access Control is implemented within the EKS cluster to manage fine-grained access to Kubernetes resources. |
| 147 | +- **AWS Certificate Manager**: Integrated to manage SSL/TLS certificates for secure communication within the cluster. |
| 148 | + |
| 149 | +### Monitoring and Logging |
| 150 | + |
| 151 | +- **Amazon CloudWatch**: Used for monitoring and logging of AWS resources and applications running on the EKS cluster. |
| 152 | +- **Amazon Managed Grafana and Prometheus**: Provide additional monitoring and observability capabilities, helping to detect and respond to security events. |
| 153 | + |
| 154 | +### Container Security |
| 155 | + |
| 156 | +- **Amazon ECR**: Stores container images in a secure, encrypted repository. It includes vulnerability scanning to identify security issues in your container images. |
| 157 | + |
| 158 | +### Secrets Management |
| 159 | + |
| 160 | +- **AWS Secrets Manager**: While not explicitly shown in the diagram, it's commonly used to securely store and manage sensitive information such as database credentials, API keys, and other secrets used by applications running on EKS. |
| 161 | + |
| 162 | +### Additional Security Considerations |
| 163 | + |
| 164 | +- Regularly update and patch EKS clusters, worker nodes, and workload container images. |
| 165 | +- Implement network policies to control pod-to-pod communication within the cluster. |
| 166 | +- Use Pod Security Policies or Pod Security Standards to enforce security best practices for pods. |
| 167 | +- Implement proper logging and auditing mechanisms for both AWS and Kubernetes resources. |
| 168 | +- Regularly review and rotate IAM and Kubernetes RBAC permissions. |
| 169 | + |
| 170 | +## Supported AWS Regions |
| 171 | + |
| 172 | +Guidance for Scalable Model Inference and Agentic AI on Amazon EKS is supported in the following AWS Regions: |
| 173 | + |
| 174 | +| Region Name | Region Code | |
| 175 | +|-------------|-------------| |
| 176 | +| US East (N. Virginia) | us-east-1 | |
| 177 | +| US East (Ohio) | us-east-2 | |
| 178 | +| US West (Oregon) | us-west-2 | |
| 179 | +| Asia Pacific (Mumbai) | ap-south-1 | |
| 180 | +| Asia Pacific (Seoul) | ap-northeast-2 | |
| 181 | +| Asia Pacific (Singapore) | ap-southeast-1 | |
| 182 | +| Asia Pacific (Sydney) | ap-southeast-2 | |
| 183 | +| Asia Pacific (Tokyo) | ap-northeast-1 | |
| 184 | +| Europe (Frankfurt) | eu-central-1 | |
| 185 | +| Europe (Ireland) | eu-west-1 | |
| 186 | +| Europe (London) | eu-west-2 | |
| 187 | +| Europe (Paris) | eu-west-3 | |
| 188 | +| Europe (Stockholm) | eu-north-1 | |
| 189 | +| South America (São Paulo) | sa-east-1 | |
| 190 | + |
| 191 | +## Service Quotas |
| 192 | + |
| 193 | +Service quotas, also referred to as limits, are the maximum number of service resources or operations for your AWS account. |
| 194 | + |
| 195 | +### Quotas for AWS services in this Guidance |
| 196 | + |
| 197 | +Make sure you have sufficient quota for each of the AWS services implemented in this solution (see [AWS Services in this guidance](#aws-services-in-this-Guidance)). |
| 198 | +For more information, see [AWS service quotas](https://docs.aws.amazon.com/general/latest/gr/aws_service_limits.html){:target="_blank"}. |
| 199 | + |
| 200 | +To view the service quotas for all AWS services in the documentation without switching pages, view the information in the |
| 201 | +[Service endpoints and quotas](https://docs.aws.amazon.com/general/latest/gr/aws-general.pdf#aws-service-information){:target="_blank"} |
| 202 | +page in the PDF format. |
| 203 | + |
| 204 | + |
115 | 205 | ## Third-Party Dependencies Disclaimer |
116 | 206 |
|
117 | 207 | This sample code utilizes various third-party packages, modules, models, and datasets, including but not limited to: |
|
0 commit comments