{"id":125317,"date":"2023-12-15T15:09:49","date_gmt":"2023-12-15T13:09:49","guid":{"rendered":"https:\/\/jfrog.com\/blog\/enhancing-aws-security-with-jfrog-and-assumerole\/"},"modified":"2025-01-27T18:27:19","modified_gmt":"2025-01-27T16:27:19","slug":"enhancing-aws-security-with-jfrog-and-assumerole","status":"publish","type":"post","link":"https:\/\/jfrog.com\/de\/blog\/enhancing-aws-security-with-jfrog-and-assumerole\/","title":{"rendered":"Kubernetes Security st\u00e4rken: JFrogs nahtlose Integration mit AWS AssumeRole"},"content":{"rendered":"<h2><img decoding=\"async\" class=\"alignnone size-full wp-image-123175\" src=\"https:\/\/media.jfrog.com\/wp-content\/uploads\/2023\/12\/15141727\/AssumeRole-863x300-1.png\" alt=\"JFrog Access and AWS AssumeRoll enhance Kuernetes security.\" width=\"863\" height=\"300\" \/><\/h2>\n<h2 class=\"entry-title text-left\">Was ist AssumeRole und warum sollten Sie es nutzen?<\/h2>\n<p>In der schnelllebigen Umgebung von Cloud-nativen Anwendungen haben Sicherheit und nahtlose Verbindungen h\u00f6chste Priorit\u00e4t. Viele <a href=\"https:\/\/jfrog.com\/de\/devops-tools\/what-is-devops\/\">DevOps-<\/a> und SecOps-Profis nutzen die nativen Funktionen von Kubernetes, um die Sicherheit ihrer Container zu verwalten und so die Kontrolle \u00fcber Zugriffsrechte und Geheimnisse zu behalten, um die Sicherheit zu verbessern.<\/p>\n<p>Die Integration zwischen <a href=\"https:\/\/docs.aws.amazon.com\/STS\/latest\/APIReference\/API_AssumeRole.html\">AWS AssumeRole<\/a> und <a href=\"https:\/\/jfrog.com\/blog\/managing-security-entities-with-jfrog-access\/\">JFrog Access<\/a> in Amazon Elastic Kubernetes Services (EKS) verbessert die Unternehmenssicherheit durch die Automatisierung des Secret-Managements.<\/p>\n<p>Da sich die Cloud-Computing-Landschaft st\u00e4ndig weiterentwickelt, gibt es eine betr\u00e4chtliche Anzahl gemeinsamer AWS- und JFrog-Kunden, f\u00fcr die die Nutzung von AssumeRole unverzichtbar geworden ist.\u00a0 Was genau ist also AssumeRole und warum ist es so wichtig f\u00fcr die Sicherheit von AWS?<\/p>\n<h2>Manuelle Verwaltung von Secrets in Kubernetes ist eine Herausforderung<\/h2>\n<p>Herk\u00f6mmliche Methoden zur Verwaltung von Credentials und Secrets in Kubernetes erfordern oft manuelle Eingriffe, was <strong>zu mehreren potentiellen <a href=\"https:\/\/jfrog.com\/de\/devops-tools\/article\/software-vulnerability\/\">Sicherheitsl\u00fccken<\/a> f\u00fchrt<\/strong>, die die allgemeine Datensicherheit gef\u00e4hrden k\u00f6nnen. Nachfolgend sind einige h\u00e4ufige Probleme aufgef\u00fchrt, die bei der Verwendung eines manuellen Ansatzes auftreten k\u00f6nnen:<\/p>\n<ul>\n<li><strong>Menschliches Versagen<\/strong> &#8211; Erh\u00f6ht die Wahrscheinlichkeit von Fehlkonfigurationen und der Kompromittierung sensibler Informationen.<\/li>\n<li><strong>Unverschl\u00fcsseltes Speichern<\/strong> &#8211; Vertrauliche Informationen im Klartext zu speichern, kann dazu f\u00fchren, dass Unbefugte auf sie zugreifen.<\/li>\n<li><strong>Audit- und Protokollierungsl\u00fccken<\/strong> &#8211; Bei manuellem Secrets-Management fehlt es an geeigneten Tracking-Mechanismen, so dass es schwierig ist, festzustellen, wer auf sensible Informationen zugegriffen oder sie ver\u00e4ndert hat.<\/li>\n<li><strong>Statische Geheimnisse<\/strong> &#8211; Secrets, die sich nicht \u00e4ndern, stellen ein erhebliches Risiko dar und sind mit herk\u00f6mmlichen Methoden nur schwer aufrechtzuerhalten.<\/li>\n<li><strong>Manuelle Vergabe von Zugangsdaten &#8211;<\/strong> Die manuelle Vergabe von Zugangsdaten kann zeitaufwendig und fehleranf\u00e4llig sein, was das Risiko von Identit\u00e4tsdiebstahl erh\u00f6ht.<\/li>\n<\/ul>\n<p>Um diese Schwachstellen zu beseitigen, m\u00fcssen sicherere Verfahren eingef\u00fchrt werden, die wichtige Prozesse automatisieren k\u00f6nnen, um diese und andere Schwachstellen zu vermeiden.<\/p>\n<h2>Eine automatisierte L\u00f6sung mit AssumeRole &amp; JFrog Access<\/h2>\n<p>Die Integration von AssumeRole mit JFrog Access ist ein m\u00e4chtiges Feature. Durch die Nutzung von AssumeRole k\u00f6nnen AWS <a href=\"https:\/\/aws.amazon.com\/iam\/\">Identity and Access Management (IAM)<\/a> Benutzer tempor\u00e4r Berechtigungen \u00fcbernehmen, um Aktionen auf sichere und kontrollierte Art und Weise durchzuf\u00fchren.<\/p>\n<p>Die Integration von AssumeRole und JFrog Access macht Ihr Artifactory-Repository zu einem zentralen Bestandteil Ihrer AWS-Umgebung. Das bedeutet, dass Sie Images nahtlos aus Ihrem Artifactory-Repository fetchen k\u00f6nnen, als w\u00e4re es eine native Komponente Ihres EKS-Clusters. So wird die Zugriffskontrolle versch\u00e4rft, was eine nahtlose Integration sicherstellt, die mit bew\u00e4hrten Standards der Branche einhergeht.<\/p>\n<p>Einige der zentralen Vorteile der L\u00f6sung aus AWS AssumeRole und JFrog Access sind:<\/p>\n<ol>\n<li><strong>Automatisierte Token-Rotation:<\/strong> JFrog Access kann nun die Token-Rotation innerhalb Ihres EKS-Clusters direkt verwalten. Dies macht manuelle Aktionen \u00fcberfl\u00fcssig und reduziert das Risiko unautorisierter Zugriffe aufgrund vergessener oder vernachl\u00e4ssigter Anmeldeinformationen.<\/li>\n<li><strong>Verbesserte Sicherheit:<\/strong> Mit AssumeRole k\u00f6nnen Sie pr\u00e4zise Zugriffskontrollen durchsetzen, die sicherstellen, dass nur autorisierte Personen Zugang zu Ihrem EKS-Cluster und JFrog Artifactory haben. Dies erh\u00f6ht die Sicherheit durch Minimierung der Angriffsfl\u00e4che und Einhaltung des Least-Privilege-Prinzips.<\/li>\n<li><strong>Integration in die AWS Umgebung:<\/strong> Die Integration von AssumeRole und JFrog Access macht Ihr Artifactory-Repository zu einem zentralen Bestandteil Ihrer AWS-Umgebung. Das bedeutet, dass Sie Bilder nahtlos aus Ihrem Artifactory-Repository abrufen k\u00f6nnen, als w\u00e4re es eine native Komponente Ihres EKS-Clusters.<\/li>\n<\/ol>\n<h2>AssumeRole JFrog Architektur &amp; Bereitstellung<\/h2>\n<p style=\"text-align: left\">Das untenstehende Diagramm zeigt die grundlegende Architektur, wie AssumeRole mit JFrog Access integriert wird, um eine erweiterte Zugangskontrolle zu erm\u00f6glichen:<\/p>\n<p style=\"text-align: center\"><img decoding=\"async\" class=\"size-full wp-image-123259 aligncenter\" src=\"https:\/\/media.jfrog.com\/wp-content\/uploads\/2023\/12\/18092157\/AssumeRole_operational_diagram_v2.png\" alt=\"The JFrog Platform and AWS AssumeRole enhance EKS security\" width=\"1578\" height=\"746\" \/><em>Das Setzen der Annotiation bewirkt, dass EKS automatisch Anmeldeinformationen f\u00fcr &#8220;myRole&#8221; generiert, die jedem Workload zur Verf\u00fcgung stehen, der das Servicekonto verwendet.<\/em><\/p>\n<p>Wenn Sie von einer unsicheren manuellen Geheimnisverwaltung zu einem sicheren automatisierten Secrets-Management wechseln m\u00f6chten, beginnt Ihre Reise in eine sichere und containerisierte Zukunft genau hier.<\/p>\n<p>Sehen Sie sich unsere<a href=\"https:\/\/jfrog.com\/help\/r\/setting-up-jfrog-s-assumerole-capabilities-in-aws\/artifactory-setting-up-jfrog-s-assumerole-capabilities-in-aws\"><strong> Schritt-f\u00fcr-Schritt-Anleitung zur Installation und Konfiguration<\/strong><\/a> an und erfahren Sie, wie schnell Sie diese leistungsstarke Funktion nutzen k\u00f6nnen.<\/p>\n<h2>Fazit<\/h2>\n<p>Die Integration von AWS AssumeRole und JFrog Access in Ihre EKS-Umgebung ist ein wesentlicher Schritt auf dem Weg zu mehr Sicherheit und Effizienz im Unternehmen. Durch die Automatisierung einer Token-Rotation, die Verbesserung von Zugriffskontrollen und die nahtlose Integration von JFrog Artifactory in Ihre AWS-Umgebung sind Sie bestens ger\u00fcstet, um Ihre containerisierten Workloads zuk\u00fcnftig auf sichere und effiziente Weise zu verwalten. Besuchen Sie die <a href=\"https:\/\/jfrog.com\/de\/partner\/aws\/\">AWS-Partnerseite <\/a>f\u00fcr weitere Infos dazu, wie JFrog und AWS die Entwicklung von Cloud-Anwendungen f\u00fcr unsere Kunden sicherer und effizienter machen.<\/p>\n<p>JFrog Kunden, die das Feature direkt nutzen m\u00f6chten, k\u00f6nnen sich die <a href=\"https:\/\/jfrog.com\/help\/r\/setting-up-jfrog-s-assumerole-capabilities-in-aws\/artifactory-setting-up-jfrog-s-assumerole-capabilities-in-aws\">AssumeRole Dokumentation in der JFrog Knowledge Base <\/a>ansehen.<\/p>\n<p>Wenn Sie noch kein JFrog SaaS Kunde sind und mehr erfahren m\u00f6chten, registrieren Sie sich f\u00fcr eine kostenlose Testversion der<a href=\"https:\/\/jfrog.com\/de\/start-free\/aws\/\"> JFrog Software Supply Chain Platform auf AWS.<\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Was ist AssumeRole und warum sollten Sie es nutzen? In der schnelllebigen Umgebung von Cloud-nativen Anwendungen haben Sicherheit und nahtlose Verbindungen h\u00f6chste Priorit\u00e4t. Viele DevOps- und SecOps-Profis nutzen die nativen Funktionen von Kubernetes, um die Sicherheit ihrer Container zu verwalten und so die Kontrolle \u00fcber Zugriffsrechte und Geheimnisse zu behalten, um die Sicherheit zu verbessern. &hellip;<\/p>\n","protected":false},"author":590,"featured_media":123180,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[10409,10410,10411,10412,10400,10157,9434,9248,9205],"tags":[10415,10416,10417,10418,10413,10414],"class_list":["post-125317","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-distribution-de","category-ci-cd-pipelines-de","category-software-distribution-de","category-news-releases-de","category-pipelines-de","category-sicherheit-und-devsecops","category-haupt-blog-kategorien","category-plattform","category-unkategorisiert","tag-kubernetes-tokens-de","tag-token-rotation-de","tag-jfrog-access-de","tag-aws-assumerole-de","tag-kubernetes-security-de","tag-kubernetes-secret-management-de"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.6 (Yoast SEO v22.6) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Kubernetes Secrets Security mit JFrog Access &amp; AWS AssumeRole<\/title>\n<meta name=\"description\" content=\"Durch die Integration von AWS AssumeRole &amp; JFrog Access in Amazon Elastic Kubernetes Services (EKS) l\u00e4sst sich Ihr Secrets-Management automatisieren.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/jfrog.com\/de\/wp-json\/wp\/v2\/posts\/125317\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Kubernetes Security st\u00e4rken: JFrogs nahtlose Integration mit AWS AssumeRole\" \/>\n<meta property=\"og:description\" content=\"Durch die Integration von AWS AssumeRole &amp; JFrog Access in Amazon Elastic Kubernetes Services (EKS) l\u00e4sst sich Ihr Secrets-Management automatisieren.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/jfrog.com\/de\/blog\/enhancing-aws-security-with-jfrog-and-assumerole\/\" \/>\n<meta property=\"og:site_name\" content=\"JFrog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/artifrog\" \/>\n<meta property=\"article:published_time\" content=\"2023-12-15T13:09:49+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-27T16:27:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/media.jfrog.com\/wp-content\/uploads\/2023\/12\/15141748\/AssumeRole-1200x960-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"960\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"drewt\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@jfrog\" \/>\n<meta name=\"twitter:site\" content=\"@jfrog\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"drewt\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/jfrog.com\/de\/blog\/enhancing-aws-security-with-jfrog-and-assumerole\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/jfrog.com\/de\/blog\/enhancing-aws-security-with-jfrog-and-assumerole\/\"},\"author\":{\"name\":\"drewt\",\"@id\":\"https:\/\/jfrog.com\/de\/#\/schema\/person\/c84b32acf61c0b7c85a306cb03697b28\"},\"headline\":\"Kubernetes Security st\u00e4rken: JFrogs nahtlose Integration mit AWS AssumeRole\",\"datePublished\":\"2023-12-15T13:09:49+00:00\",\"dateModified\":\"2025-01-27T16:27:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/jfrog.com\/de\/blog\/enhancing-aws-security-with-jfrog-and-assumerole\/\"},\"wordCount\":794,\"publisher\":{\"@id\":\"https:\/\/jfrog.com\/de\/#organization\"},\"image\":{\"@id\":\"https:\/\/jfrog.com\/de\/blog\/enhancing-aws-security-with-jfrog-and-assumerole\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2023\/12\/15141752\/AssumeRole-Blog_Thumbnail.png\",\"keywords\":[\"Kubernetes tokens\",\"token rotation\",\"JFrog Access\",\"AWS AssumeRole\",\"Kubernetes security\",\"Kubernetes secret management\"],\"articleSection\":[\"Distribution\",\"CI\/CD Pipelines\",\"Software Distribution\",\"News &amp; Releases\",\"Pipelines\",\"Sicherheit und DevSecOps\",\"Haupt-Blog-Kategorien\",\"Plattform\",\"Unkategorisiert\"],\"inLanguage\":\"de-DE\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/jfrog.com\/de\/blog\/enhancing-aws-security-with-jfrog-and-assumerole\/\",\"url\":\"https:\/\/jfrog.com\/de\/blog\/enhancing-aws-security-with-jfrog-and-assumerole\/\",\"name\":\"Kubernetes Secrets Security mit JFrog Access & AWS AssumeRole\",\"isPartOf\":{\"@id\":\"https:\/\/jfrog.com\/de\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/jfrog.com\/de\/blog\/enhancing-aws-security-with-jfrog-and-assumerole\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/jfrog.com\/de\/blog\/enhancing-aws-security-with-jfrog-and-assumerole\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2023\/12\/15141752\/AssumeRole-Blog_Thumbnail.png\",\"datePublished\":\"2023-12-15T13:09:49+00:00\",\"dateModified\":\"2025-01-27T16:27:19+00:00\",\"description\":\"Durch die Integration von AWS AssumeRole & JFrog Access in Amazon Elastic Kubernetes Services (EKS) l\u00e4sst sich Ihr Secrets-Management automatisieren.\",\"breadcrumb\":{\"@id\":\"https:\/\/jfrog.com\/de\/blog\/enhancing-aws-security-with-jfrog-and-assumerole\/#breadcrumb\"},\"inLanguage\":\"de-DE\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/jfrog.com\/de\/blog\/enhancing-aws-security-with-jfrog-and-assumerole\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\/\/jfrog.com\/de\/blog\/enhancing-aws-security-with-jfrog-and-assumerole\/#primaryimage\",\"url\":\"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2023\/12\/15141752\/AssumeRole-Blog_Thumbnail.png\",\"contentUrl\":\"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2023\/12\/15141752\/AssumeRole-Blog_Thumbnail.png\",\"width\":203,\"height\":148,\"caption\":\"JFrog Access and AWS AssumeRoll enhance Kuernetes security.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/jfrog.com\/de\/blog\/enhancing-aws-security-with-jfrog-and-assumerole\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/jfrog.com\/de\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Kubernetes Security st\u00e4rken: JFrogs nahtlose Integration mit AWS AssumeRole\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/jfrog.com\/de\/#website\",\"url\":\"https:\/\/jfrog.com\/de\/\",\"name\":\"JFrog\",\"description\":\"Deliver Trusted Software Releases at Speed and Scale\",\"publisher\":{\"@id\":\"https:\/\/jfrog.com\/de\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/jfrog.com\/de\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"de-DE\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/jfrog.com\/de\/#organization\",\"name\":\"JFrog\",\"url\":\"https:\/\/jfrog.com\/de\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\/\/jfrog.com\/de\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2025\/05\/27095207\/Logo.svg\",\"contentUrl\":\"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2025\/05\/27095207\/Logo.svg\",\"width\":74,\"height\":73,\"caption\":\"JFrog\"},\"image\":{\"@id\":\"https:\/\/jfrog.com\/de\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/artifrog\",\"https:\/\/x.com\/jfrog\",\"https:\/\/www.linkedin.com\/company\/455737\",\"https:\/\/www.youtube.com\/channel\/UCh2hNg76zo3d1qQqTWIQxDg\",\"https:\/\/www.wikidata.org\/wiki\/Q98608948\"],\"description\":\"We set out on our Liquid Software journey in 2008, with the mission to transform the way enterprises manage and release software updates. The world expects software to update continuously, securely, non-intrusively and without user intervention. This hyper-connected experience can only be enabled by automation with an end-to-end DevOps platform and a binary-centric focus. With this in mind, we\u2019ve developed the JFrog Platform, ushering in a new era of DevOps and DevSecOps standards that power continuous updates. More than a decade after our founding, with thousands of customers and millions of users globally, JFrog has become the \u201cDatabase of DevOps\u201d and the de-facto standard in release and update management.\",\"legalName\":\"Jfrog, Inc.\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"1001\",\"maxValue\":\"5000\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/jfrog.com\/de\/#\/schema\/person\/c84b32acf61c0b7c85a306cb03697b28\",\"name\":\"drewt\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\/\/jfrog.com\/de\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/a9566b6b2e5e2e34deeb94dfeae460f70d7c7d08606c66ebb53f94a07386253c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/a9566b6b2e5e2e34deeb94dfeae460f70d7c7d08606c66ebb53f94a07386253c?s=96&d=mm&r=g\",\"caption\":\"drewt\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Kubernetes Secrets Security mit JFrog Access & AWS AssumeRole","description":"Durch die Integration von AWS AssumeRole & JFrog Access in Amazon Elastic Kubernetes Services (EKS) l\u00e4sst sich Ihr Secrets-Management automatisieren.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/jfrog.com\/de\/wp-json\/wp\/v2\/posts\/125317","og_locale":"de_DE","og_type":"article","og_title":"Kubernetes Security st\u00e4rken: JFrogs nahtlose Integration mit AWS AssumeRole","og_description":"Durch die Integration von AWS AssumeRole & JFrog Access in Amazon Elastic Kubernetes Services (EKS) l\u00e4sst sich Ihr Secrets-Management automatisieren.","og_url":"https:\/\/jfrog.com\/de\/blog\/enhancing-aws-security-with-jfrog-and-assumerole\/","og_site_name":"JFrog","article_publisher":"https:\/\/www.facebook.com\/artifrog","article_published_time":"2023-12-15T13:09:49+00:00","article_modified_time":"2025-01-27T16:27:19+00:00","og_image":[{"width":1200,"height":960,"url":"https:\/\/media.jfrog.com\/wp-content\/uploads\/2023\/12\/15141748\/AssumeRole-1200x960-1.png","type":"image\/png"}],"author":"drewt","twitter_card":"summary_large_image","twitter_creator":"@jfrog","twitter_site":"@jfrog","twitter_misc":{"Written by":"drewt","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/jfrog.com\/de\/blog\/enhancing-aws-security-with-jfrog-and-assumerole\/#article","isPartOf":{"@id":"https:\/\/jfrog.com\/de\/blog\/enhancing-aws-security-with-jfrog-and-assumerole\/"},"author":{"name":"drewt","@id":"https:\/\/jfrog.com\/de\/#\/schema\/person\/c84b32acf61c0b7c85a306cb03697b28"},"headline":"Kubernetes Security st\u00e4rken: JFrogs nahtlose Integration mit AWS AssumeRole","datePublished":"2023-12-15T13:09:49+00:00","dateModified":"2025-01-27T16:27:19+00:00","mainEntityOfPage":{"@id":"https:\/\/jfrog.com\/de\/blog\/enhancing-aws-security-with-jfrog-and-assumerole\/"},"wordCount":794,"publisher":{"@id":"https:\/\/jfrog.com\/de\/#organization"},"image":{"@id":"https:\/\/jfrog.com\/de\/blog\/enhancing-aws-security-with-jfrog-and-assumerole\/#primaryimage"},"thumbnailUrl":"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2023\/12\/15141752\/AssumeRole-Blog_Thumbnail.png","keywords":["Kubernetes tokens","token rotation","JFrog Access","AWS AssumeRole","Kubernetes security","Kubernetes secret management"],"articleSection":["Distribution","CI\/CD Pipelines","Software Distribution","News &amp; Releases","Pipelines","Sicherheit und DevSecOps","Haupt-Blog-Kategorien","Plattform","Unkategorisiert"],"inLanguage":"de-DE"},{"@type":"WebPage","@id":"https:\/\/jfrog.com\/de\/blog\/enhancing-aws-security-with-jfrog-and-assumerole\/","url":"https:\/\/jfrog.com\/de\/blog\/enhancing-aws-security-with-jfrog-and-assumerole\/","name":"Kubernetes Secrets Security mit JFrog Access & AWS AssumeRole","isPartOf":{"@id":"https:\/\/jfrog.com\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/jfrog.com\/de\/blog\/enhancing-aws-security-with-jfrog-and-assumerole\/#primaryimage"},"image":{"@id":"https:\/\/jfrog.com\/de\/blog\/enhancing-aws-security-with-jfrog-and-assumerole\/#primaryimage"},"thumbnailUrl":"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2023\/12\/15141752\/AssumeRole-Blog_Thumbnail.png","datePublished":"2023-12-15T13:09:49+00:00","dateModified":"2025-01-27T16:27:19+00:00","description":"Durch die Integration von AWS AssumeRole & JFrog Access in Amazon Elastic Kubernetes Services (EKS) l\u00e4sst sich Ihr Secrets-Management automatisieren.","breadcrumb":{"@id":"https:\/\/jfrog.com\/de\/blog\/enhancing-aws-security-with-jfrog-and-assumerole\/#breadcrumb"},"inLanguage":"de-DE","potentialAction":[{"@type":"ReadAction","target":["https:\/\/jfrog.com\/de\/blog\/enhancing-aws-security-with-jfrog-and-assumerole\/"]}]},{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/jfrog.com\/de\/blog\/enhancing-aws-security-with-jfrog-and-assumerole\/#primaryimage","url":"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2023\/12\/15141752\/AssumeRole-Blog_Thumbnail.png","contentUrl":"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2023\/12\/15141752\/AssumeRole-Blog_Thumbnail.png","width":203,"height":148,"caption":"JFrog Access and AWS AssumeRoll enhance Kuernetes security."},{"@type":"BreadcrumbList","@id":"https:\/\/jfrog.com\/de\/blog\/enhancing-aws-security-with-jfrog-and-assumerole\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/jfrog.com\/de\/"},{"@type":"ListItem","position":2,"name":"Kubernetes Security st\u00e4rken: JFrogs nahtlose Integration mit AWS AssumeRole"}]},{"@type":"WebSite","@id":"https:\/\/jfrog.com\/de\/#website","url":"https:\/\/jfrog.com\/de\/","name":"JFrog","description":"Deliver Trusted Software Releases at Speed and Scale","publisher":{"@id":"https:\/\/jfrog.com\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/jfrog.com\/de\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"de-DE"},{"@type":"Organization","@id":"https:\/\/jfrog.com\/de\/#organization","name":"JFrog","url":"https:\/\/jfrog.com\/de\/","logo":{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/jfrog.com\/de\/#\/schema\/logo\/image\/","url":"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2025\/05\/27095207\/Logo.svg","contentUrl":"https:\/\/speedmedia2.jfrog.com\/08612fe1-9391-4cf3-ac1a-6dd49c36b276\/media.jfrog.com\/wp-content\/uploads\/2025\/05\/27095207\/Logo.svg","width":74,"height":73,"caption":"JFrog"},"image":{"@id":"https:\/\/jfrog.com\/de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/artifrog","https:\/\/x.com\/jfrog","https:\/\/www.linkedin.com\/company\/455737","https:\/\/www.youtube.com\/channel\/UCh2hNg76zo3d1qQqTWIQxDg","https:\/\/www.wikidata.org\/wiki\/Q98608948"],"description":"We set out on our Liquid Software journey in 2008, with the mission to transform the way enterprises manage and release software updates. The world expects software to update continuously, securely, non-intrusively and without user intervention. This hyper-connected experience can only be enabled by automation with an end-to-end DevOps platform and a binary-centric focus. With this in mind, we\u2019ve developed the JFrog Platform, ushering in a new era of DevOps and DevSecOps standards that power continuous updates. More than a decade after our founding, with thousands of customers and millions of users globally, JFrog has become the \u201cDatabase of DevOps\u201d and the de-facto standard in release and update management.","legalName":"Jfrog, Inc.","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"1001","maxValue":"5000"}},{"@type":"Person","@id":"https:\/\/jfrog.com\/de\/#\/schema\/person\/c84b32acf61c0b7c85a306cb03697b28","name":"drewt","image":{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/jfrog.com\/de\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/a9566b6b2e5e2e34deeb94dfeae460f70d7c7d08606c66ebb53f94a07386253c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a9566b6b2e5e2e34deeb94dfeae460f70d7c7d08606c66ebb53f94a07386253c?s=96&d=mm&r=g","caption":"drewt"}}]}},"_links":{"self":[{"href":"https:\/\/jfrog.com\/de\/wp-json\/wp\/v2\/posts\/125317","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jfrog.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jfrog.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/jfrog.com\/de\/wp-json\/wp\/v2\/users\/590"}],"replies":[{"embeddable":true,"href":"https:\/\/jfrog.com\/de\/wp-json\/wp\/v2\/comments?post=125317"}],"version-history":[{"count":4,"href":"https:\/\/jfrog.com\/de\/wp-json\/wp\/v2\/posts\/125317\/revisions"}],"predecessor-version":[{"id":147890,"href":"https:\/\/jfrog.com\/de\/wp-json\/wp\/v2\/posts\/125317\/revisions\/147890"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/jfrog.com\/de\/wp-json\/wp\/v2\/media\/123180"}],"wp:attachment":[{"href":"https:\/\/jfrog.com\/de\/wp-json\/wp\/v2\/media?parent=125317"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jfrog.com\/de\/wp-json\/wp\/v2\/categories?post=125317"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jfrog.com\/de\/wp-json\/wp\/v2\/tags?post=125317"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}