kube2iam is a Kubernetes solution that provides IAM credentials to containers based on pod annotations. The tool intercepts traffic directed to the EC2 metadata API from Docker containers and redirects it to a dedicated container running on each cluster node. When a container requests IAM credentials, kube2iam makes calls to the AWS API to retrieve temporary credentials and returns them to the requesting container. This allows containers to assume specific IAM roles without requiring static credentials or broad permissions. The system operates by running a privileged container on each Kubernetes node that acts as a proxy for metadata API requests. Non-IAM related metadata requests are forwarded to the actual EC2 metadata API, while IAM credential requests are handled by the kube2iam service. The tool requires appropriate IAM permissions to assume roles and retrieve temporary credentials from AWS. Container access to specific IAM roles is controlled through Kubernetes pod annotations, providing a mechanism to implement least-privilege access patterns in containerized environments.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A list of Windows privilege escalation techniques, categorized and explained in detail.
A PHP OAuth 2.0 authorization server implementation with support for various grants and RFCs.
A simple drop-in library for managing users, permissions, and groups in your application.
A list of disposable email domains to detect or block disposable accounts
Encrypt Kubernetes Secrets into SealedSecrets for safe storage and controlled decryption within the cluster.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.