Securing your cluster with network policies

In this chapter, we are going to use two tools to secure our cluster by using network policies and then integrating our cluster’s network policies with EKS security groups.

First we will use Project Calico to enforce Kubernetes network policies in our cluster, protecting our various microservices.

After that, we will use Tigera’s Secure Cloud Edition to integrate the Kubernetes network policies with Amazon’s VPC security groups.

calico