Summary
In this chapter, we created a VPC network that spans three availability zones. On top of that network, we provisioned an EKS cluster. We managed to integrate the EKS cluster with AWS Secrets Manager. This was done securely by implementing a fine-grained role on AWS mapped to our Kubernetes workloads. We then proceeded to identify the operations that took place with regard to the Secrets stored on AWS Secrets Manager by checking CloudWatch and CloudTrail logs. Lastly, we encrypted the Secrets residing on an EKS cluster by using a managed KMS. In the next chapter, we shall focus on another popular cloud provider and its secret-handling capabilities: Microsoft Azure.