Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[ENH] Allows users to pass custom KMS keys for AWS eks cluster encryption #2746

Open
tylergraff opened this issue Sep 26, 2024 · 3 comments · May be fixed by #2788 or nebari-dev/nebari-docs#537
Open
Assignees

Comments

@tylergraff
Copy link
Contributor

Feature description

For our use-case, we need to allow organizations to create their own AWS KMS keys to match their organizational policy, or possibly re-use existing KMS keys.

Value and/or benefit

Allows organizations to address security issues related to KMS encryption.

Anything else?

Related to:
#2681

@tylergraff
Copy link
Contributor Author

relates to: nebari-dev/governance#55

@tylergraff
Copy link
Contributor Author

@tylergraff
Copy link
Contributor Author

Proposed fix:
#2723

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment