Find the Best Cosmetic Hospitals

Explore trusted cosmetic hospitals and make a confident choice for your transformation.

“Invest in yourself — your confidence is always worth it.”

Explore Cosmetic Hospitals

Start your journey today — compare options in one place.

EKS Tutorials: Types of Security Groups Created or Used in an EKS Cluster

When you set up an Amazon EKS (Elastic Kubernetes Service) cluster, AWS automatically creates and/or requires several security groups to manage access to the control plane, worker nodes, and other associated components.

Here’s a complete breakdown of the types of Security Groups involved during an EKS cluster setup:


🔐 Types of Security Groups Created or Used in an EKS Cluster

1. EKS Control Plane Security Group (Optional/Custom)

🔹 NameCustom
EKS Control Plane Security Group✅ (You define it in the cluster config)
  • Purpose: Controls communication from the control plane to worker nodes (EC2/EKS-managed).
  • Traffic direction: Egress traffic from control plane → worker nodes (TCP 443 by default).
  • When it’s defined: You specify this group when creating a cluster using the vpcConfig.securityGroupIds.

✅ This group is not created automatically – it’s the one you pass in during setup.


2. EKS Managed Node Group Security Group (Auto-created by EKS)

🔹 NameAuto-created
Node Security Group (Worker Nodes)✅ Yes
  • Created when: You launch a managed node group.
  • Purpose: Controls traffic between nodes and from the nodes to the control plane.
  • Includes ingress rules for:
    • Node-to-node communication
    • Control plane-to-node communication

⚠️ This security group is automatically associated with your EC2 worker nodes.


3. Cluster Shared Node Security Group (Created Automatically)

🔹 NameAuto-created
Cluster Shared Node Security Group✅ Yes
  • Purpose: Used for:
    • Worker node communication (pods across nodes)
    • Internal services
  • Managed by EKS: You cannot delete this manually.
  • Shared across multiple node groups in the cluster.

This SG ensures pods and services across nodes in the cluster can communicate securely.


4. Fargate Pod Execution Role SG (if using Fargate)

🔹 NameUser-defined
Fargate Pod ENI Security Group✅ Yes (you must specify)
  • If you’re using Fargate profiles, you need to define a security group that controls the network interfaces attached to the Fargate pods.
  • This group handles pod-level network access when no EC2 nodes are used.

5. Load Balancer Security Group (Optional)

🔹 NameCustom or auto
Load Balancer SG✅ Yes (by user or created by controller)
  • For services of type LoadBalancer, AWS creates an ELB (Classic/NLB/ALB).
  • This SG controls traffic from the internet or other services to the service endpoints.

Summary Table

Security Group TypeCreated ByPurpose
Control Plane SGUser-definedAllow traffic from control plane to worker nodes
Worker Node SGAuto-createdAllow intra-node and control plane communication
Cluster Shared Node SGAuto-createdCommon communication for all nodes
Fargate Pod SGUser-definedManage traffic for Fargate pod ENIs
Load Balancer SGController/UserAllow external traffic to Kubernetes services

🧠 Best Practices

  • Always restrict Control Plane SG to only allow required ports (like 443).
  • Tag all SGs with kubernetes.io/cluster/<cluster-name> = owned for EKS to manage them.
  • Use Network Policies inside the cluster for fine-grained pod-to-pod security.
  • Monitor SGs with AWS Config to ensure compliance.

Find Trusted Cardiac Hospitals

Compare heart hospitals by city and services — all in one place.

Explore Hospitals
I’m a DevOps/SRE/DevSecOps/Cloud Expert passionate about sharing knowledge and experiences. I have worked at <a href="https://www.cotocus.com/">Cotocus</a>. I share tech blog at <a href="https://www.devopsschool.com/">DevOps School</a>, travel stories at <a href="https://www.holidaylandmark.com/">Holiday Landmark</a>, stock market tips at <a href="https://www.stocksmantra.in/">Stocks Mantra</a>, health and fitness guidance at <a href="https://www.mymedicplus.com/">My Medic Plus</a>, product reviews at <a href="https://www.truereviewnow.com/">TrueReviewNow</a> , and SEO strategies at <a href="https://www.wizbrand.com/">Wizbrand.</a> Do you want to learn <a href="https://www.quantumuting.com/">Quantum Computing</a>? <strong>Please find my social handles as below;</strong> <a href="https://www.rajeshkumar.xyz/">Rajesh Kumar Personal Website</a> <a href="https://www.youtube.com/TheDevOpsSchool">Rajesh Kumar at YOUTUBE</a> <a href="https://www.instagram.com/rajeshkumarin">Rajesh Kumar at INSTAGRAM</a> <a href="https://x.com/RajeshKumarIn">Rajesh Kumar at X</a> <a href="https://www.facebook.com/RajeshKumarLog">Rajesh Kumar at FACEBOOK</a> <a href="https://www.linkedin.com/in/rajeshkumarin/">Rajesh Kumar at LINKEDIN</a> <a href="https://www.wizbrand.com/rajeshkumar">Rajesh Kumar at WIZBRAND</a> <a href="https://www.rajeshkumar.xyz/dailylogs">Rajesh Kumar DailyLogs</a>

Related Posts

Terraform Backend Tutorial

Terraform is a popular open-source infrastructure as code tool used to create and manage infrastructure resources. The state of the infrastructure resources managed by Terraform is stored…

Read More

Best Tools for Software Composition Analysis (SCA)

Here’s a clear and professional explanation of the three related concepts you asked about — all of which are critical parts of secure software development, especially in…

Read More

Top 10 AI Code Review Tools in 2026: Features, Pros, Cons & Comparison

Introduction In 2026, AI code review tools have become essential for developers aiming to enhance code quality, streamline workflows, and accelerate software delivery. These tools leverage advanced…

Read More

Top 10 Expense Management Tools in 2026: Features, Pros, Cons & Comparison

Introduction Expense management tools are critical for businesses of all sizes in 2026 as they help streamline financial processes, improve budgeting, ensure compliance, and enhance financial visibility….

Read More

Top 10 Web Application Firewall (WAF) Tools in 2026: Features, Pros, Cons & Comparison

Introduction In the rapidly evolving landscape of cybersecurity, Web Application Firewalls (WAFs) have become a critical component in defending web applications from malicious attacks such as SQL…

Read More

Top 10 Endpoint Management Tools in 2026: Features, Pros, Cons & Comparison

Introduction In 2026, businesses of all sizes are increasingly reliant on a variety of devices—laptops, desktops, mobile devices, and other endpoints—that connect to their networks. With the…

Read More
Subscribe
Notify of
guest
0 Comments
Newest
Oldest Most Voted
Inline Feedbacks
View all comments
0
Would love your thoughts, please comment.x
()
x