Skip to content

Commit f5c0475

Browse files
authored
Minor re-wording for better cohesiveness
1 parent fbb82bf commit f5c0475

File tree

1 file changed

+4
-7
lines changed

1 file changed

+4
-7
lines changed

docs/docs/explanations/advanced-provider-configuration.md

Lines changed: 4 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -100,13 +100,10 @@ amazon_web_services:
100100

101101
### EKS KMS ARN (Optional)
102102

103-
AWS Key Management Service (KMS) keys can provide envelope encryption of Kubernetes secrets stored in
104-
Amazon Elastic Kubernetes Service (EKS). Kubernetes secrets store sensitive information (e.g. passwords,
105-
credentials, TLS keys, etc.). Kubernetes stores all secret object data within etcd and all etcd volumes
106-
used by Amazon EKS are encrypted at the disk-level using AWS-managed encryption keys. The benefit of
107-
specifying a user-managed KMS key for EKS is adding a level of envelope encryption to apply a security
108-
best practice of [defense-in-depth strategy](https://aws.amazon.com/blogs/containers/using-eks-encryption-provider-support-for-defense-in-depth/) by encrypting the Kubernetes secrets store with a KMS key
109-
that the user manages.
103+
You can use AWS Key Management Service (KMS) to enhance security by encrypting Kubernetes secrets in
104+
Amazon Elastic Kubernetes Service (EKS). This approach adds an extra layer of protection for sensitive
105+
information, like passwords, credentials, and TLS keys, by applying user-managed encryption keys to Kubernetes
106+
secrets, supporting a [defense-in-depth strategy](https://aws.amazon.com/blogs/containers/using-eks-encryption-provider-support-for-defense-in-depth/).
110107

111108
Nebari supports setting an existing KMS key while deploying Nebari to implement encryption of secrets
112109
created in Nebari's EKS cluster. The KMS key must be a **Symmetric** key set to **encrypt and decrypt** data.

0 commit comments

Comments
 (0)