In this chapter, we are going to use two tools to secure our cluster by using network policies and then integrating our cluster’s network policies with EKS security groups.
First we will use Project Calico to enforce Kubernetes network policies in our cluster, protecting our various microservices.
After that, we will use Calico Enterprise to