In this episode of the Virtual Coffee with Ashish edition, we spoke with Justin Garrison (Personal Website) from AWS to talk about what scenarios make sense to choose AWS EKS vs AWS ECS vs AWS Fargate vs bare metal Kubernetes & everything you need to understand for implementing AWS EKS in your environment.
--Announcing Cloud Security Villains Project--
We are always looking to find creative ways to educate folks in Cloud Security and the Cloud Security Villains is part of this education pieces. Cloud Security Villains are coming, you can learn how to defeat them in this YouTube Playlist link
Episode ShowNotes, Links and Transcript on Cloud Security Podcast: www.cloudsecuritypodcast.tv
Host Twitter: Ashish Rajan (@hashishrajan)
Guest Twitter: Justin Garrison (Personal Website)
Podcast Twitter - @CloudSecPod @CloudSecureNews
If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:
- Cloud Security News
- Cloud Security Academy
Spotify TimeStamp for Interview Questions
(00:00 introduction
(02:31 snyk.io/csp
(03:10 Justin's path into Tech
(08:14) What is AWS EKS?
(10:32) EKS vs ECS vs Fargate
(14:52) Why pick EKS vs ECS vs Fargate?
(23:05) Security Kubernetes API vs on-prem deployment?
(34:26) What's involved in deploying EKS?
(38:50) EKS clusters when scaling Kubernetes
(42:52) How clusters are structured?
(47:02) Cluster availability when upgrading
(49:00) Why people struggle with EKS?
(51:31) How can people learn more about EKS?
(52:57) The Fun Section
Cloud Native Security Strategies for 2024
Real-World Cloud Security Challenges and Solutions Explained for 2024
Why Least Privilege Matters in Cloud Security?
How is Kubernetes Network Security Evolving?
The Future of Software Development with AI
The role of Real Time Defense in Cloud Security
CISO's guide to embracing risk in business
Why Email Breaches Still Happen?
Essential Strategies to master Incident Response in Cloud
From Code Suggestions to Security
Cloud Security Operations for Modern Threats
Understanding Threat Modeling in Cloud
Balancing Efficiency & Security: AI’s Transformation of Legal Data Analysis
Sidecar Container Vulnerability in Kubernetes explained
Role of application security posture management in cybersecurity
Cybersecurity Best Practices and Password Security in Cloud and AI
Multicloud strategy for AWS and GCP
AI's Role in Security Efficiency - Kubernetes Edition
Build an Effective AWS Cloud Security Program in 2024
Offensive Cloud Security Program for 2024
Create your
podcast in
minutes
It is Free
Insight Story: Tech Trends Unpacked
Zero-Shot
Fast Forward by Tomorrow Unlocked: Tech past, tech future
The Unbelivable Truth - Series 1 - 26 including specials and pilot
Lex Fridman Podcast