Skip to content

Commit c8fe494

Browse files
authored
Style rewrites
1 parent 0ff3502 commit c8fe494

File tree

1 file changed

+1
-3
lines changed

1 file changed

+1
-3
lines changed

latest/ug/security/configuration-vulnerability-analysis.adoc

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -17,16 +17,14 @@ Security is a critical consideration for configuring and maintaining [.noloc]`Ku
1717

1818
The https://www.cisecurity.org/benchmark/kubernetes/[Center for Internet Security (CIS) Kubernetes Benchmark] provides guidance for Amazon EKS security configurations. The benchmark:
1919

20-
21-
2220
* Is applicable to Amazon EC2 nodes (both managed and self-managed) where you are responsible for security configurations of [.noloc]`Kubernetes` components.
2321
* Provides a standard, community-approved way to ensure that you have configured your [.noloc]`Kubernetes` cluster and nodes securely when using Amazon EKS.
2422
* Consists of four sections; control plane logging configuration, node security configurations, policies, and managed services.
2523
* Supports all of the [.noloc]`Kubernetes` versions currently available in Amazon EKS and can be run using https://github.com/aquasecurity/kube-bench[kube-bench], a standard open source tool for checking configuration using the CIS benchmark on [.noloc]`Kubernetes` clusters.
2624

2725
To learn more, see link:containers/introducing-cis-amazon-eks-benchmark[Introducing The CIS Amazon EKS Benchmark,type="blog"].
2826

29-
To explore an automated aws-sample pipeline for updating your node-group with CIS Benchmarked AMI, explore at: https://github.com/aws-samples/pipeline-for-hardening-eks-nodes-and-automating-updates[EKS-Optimized AMI Hardening Pipeline, type="solution"]
27+
For an automated `aws-sample` pipeline for updating your node group with a CIS benchmarked AMI, see https://github.com/aws-samples/pipeline-for-hardening-eks-nodes-and-automating-updates[EKS-Optimized AMI Hardening Pipeline].
3028

3129
[[configuration-vulnerability-analysis-pv,configuration-vulnerability-analysis-pv.title]]
3230
== Amazon EKS platform versions

0 commit comments

Comments
 (0)