Dynamic Security Compliance Checks in Amazon EKS for Regulated Industries
Keywords:
Amazon EKS, regulated industriesAbstract
In regulated industries such as healthcare and finance, stringent security and compliance measures are critical to protect sensitive data and meet industry-specific regulations. As more organizations migrate to cloud-native environments, Amazon Elastic Kubernetes Service (EKS) has become a popular solution for managing containerized applications. However, ensuring compliance in such dynamic environments presents unique challenges, particularly in industries with rigorous regulatory standards like HIPAA and PCI-DSS. This paper proposes a framework to enforce dynamic security compliance checks within Amazon EKS, explicitly designed for the evolving needs of healthcare and financial services. The framework leverages AWS's native tools, including AWS Config, AWS CloudTrail, and AWS Security Hub, to automate compliance checks and continuously monitor security posture in real-time. By integrating industry best practices and utilizing cloud-native security tools, the framework ensures that security and compliance requirements are met seamlessly without sacrificing the cloud infrastructure's agility and scalability. The approach emphasizes the importance of automation in compliance management, enabling organizations to continuously validate their security posture and respond to potential threats with minimal manual intervention. Additionally, the framework supports real-time auditing and reporting, making it easier for organizations to demonstrate compliance during inspections and audits. By embedding security and compliance checks directly into the development and deployment pipeline, the solution minimizes non-compliance risk and ensures that regulatory requirements are continuously enforced. This paper highlights the critical role of continuous monitoring and automated security tools in overcoming compliance challenges in regulated industries. The proposed framework offers a scalable, effective solution for organizations looking to maintain regulatory compliance while ensuring the flexibility and performance that cloud-native technologies provide. It offers a practical path forward for achieving secure, compliant operations in complex, fast-paced cloud environments like Amazon EKS.
Downloads
References
Kaaniche, N., & Laurent, M. (2017). Data security and privacy preservation in cloud storage environments based on cryptographic mechanisms. Computer Communications, 111, 120-141.
Tran, K. (2011). Building virtual lab with amazon cloud services (Doctoral dissertation, Minnesota State University, Mankato).
Sayfan, G. (2018). Mastering Kubernetes: Master the art of container management by using the power of Kubernetes. Packt Publishing Ltd.
Danidou, I. (2017). Trusted Computing or trust in computing? Legislating for trust networks.
Umachandran, K. (2007). Study of timber market of Malaysia and its impact on the economy and employment. Education, 2010.
Naruchitparames, J. (2011). Enhancing the privacy of data communications within information-sensitive systems (Doctoral dissertation).
Díaz-Sánchez, D., Sánchez-Guerrero, R., Arias, P., Almenarez, F., & Marín, A. (2016). A distributed transcoding and content protection system: Enabling pay per quality using the cloud. Telecommunication Systems, 61, 59-76.
Aw Ideler, H. (2012). Cryptography as a service in a cloud computing environment. EINDHOVEN UNIVERSITY OF TECHNOLOGY, Department of Mathematics and Computing Science.
Paladi, N. (2017). Trust but verify: trust establishment mechanisms in infrastructure clouds.
Dhotre, P. S. (2017). Systematic Analysis and Visualization of Privacy Policies of Online Services.
Willems, E. K. S. (2004). Environmental Sociology and the Risk Debate: Insights from the Brazilian and British Biotechnology Controversy.
Birk, F. (2018). Design and Implementation of a Scalable Crowdsensing Platform for Geospatial Data (Doctoral dissertation, Ulm University).
Bischoff, M. (2018). Design and implementation of a framework for validating kubernetes policies through automatic test generation (Doctoral dissertation, Ph. D. dissertation, Hochschule der Medien Stuttgart).
Gracia, V. M. (2018). Application driven models for resource management in cloud environments (Doctoral dissertation, Universidad de Zaragoza).
Mansuroglu, D. (2008). Using RFID In Augmented Campus Environments.
Komandla, V. Transforming Financial Interactions: Best Practices for Mobile Banking App Design and Functionality to Boost User Engagement and Satisfaction.
Gade, K. R. (2018). Real-Time Analytics: Challenges and Opportunities. Innovative Computer Sciences Journal, 4(1).
Gade, K. R. (2017). Integrations: ETL vs. ELT: Comparative analysis and best practices. Innovative Computer Sciences Journal, 3(1).
Naresh Dulam. NoSQL Vs SQL: Which Database Type Is Right for Big Data?. Distributed Learning and Broad Applications in Scientific Research, vol. 1, May 2015, pp. 115-3
Naresh Dulam. Machine Learning on Kubernetes: Scaling AI Workloads . Distributed Learning and Broad Applications in Scientific Research, vol. 2, Sept. 2016, pp. 50-70
Naresh Dulam, et al. Apache Arrow: Optimizing Data Interchange in Big Data Systems. Distributed Learning and Broad Applications in Scientific Research, vol. 3, Oct. 2017, pp. 93-114
Naresh Dulam, et al. Apache Iceberg: A New Table Format for Managing Data Lakes . Distributed Learning and Broad Applications in Scientific Research, vol. 4, Sept. 2018
Downloads
Published
Issue
Section
License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
License Terms
Ownership and Licensing:
Authors of research papers submitted to Distributed Learning and Broad Applications in Scientific Research retain the copyright of their work while granting the journal certain rights. Authors maintain ownership of the copyright and have granted the journal a right of first publication. Simultaneously, authors agree to license their research papers under the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0) License.
License Permissions:
Under the CC BY-NC-SA 4.0 License, others are permitted to share and adapt the work, as long as proper attribution is given to the authors and acknowledgement is made of the initial publication in the journal. This license allows for the broad dissemination and utilization of research papers.
Additional Distribution Arrangements:
Authors are free to enter into separate contractual arrangements for the non-exclusive distribution of the journal's published version of the work. This may include posting the work to institutional repositories, publishing it in journals or books, or other forms of dissemination. In such cases, authors are requested to acknowledge the initial publication of the work in this journal.
Online Posting:
Authors are encouraged to share their work online, including in institutional repositories, disciplinary repositories, or on their personal websites. This permission applies both prior to and during the submission process to the journal. Online sharing enhances the visibility and accessibility of the research papers.
Responsibility and Liability:
Authors are responsible for ensuring that their research papers do not infringe upon the copyright, privacy, or other rights of any third party. Scientific Research Canada disclaims any liability or responsibility for any copyright infringement or violation of third-party rights in the research papers.
If you have any questions or concerns regarding these license terms, please contact us at editor@dlabi.org.