Skip to content

Commit 1b90f44

Browse files
authored
Fixed typos
Fixed some typos and improved grammar.
1 parent cdad0a7 commit 1b90f44

File tree

1 file changed

+7
-7
lines changed

1 file changed

+7
-7
lines changed

content/en/docs/concepts/security/rbac-good-practices.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -22,15 +22,15 @@ The good practices laid out here should be read in conjunction with the general
2222

2323
### Least privilege
2424

25-
Ideally minimal RBAC rights should be assigned to users and service accounts. Only permissions
26-
explicitly required for their operation should be used. Whilst each cluster will be different,
25+
Ideally, minimal RBAC rights should be assigned to users and service accounts. Only permissions
26+
explicitly required for their operation should be used. While each cluster will be different,
2727
some general rules that can be applied are :
2828

2929
- Assign permissions at the namespace level where possible. Use RoleBindings as opposed to
3030
ClusterRoleBindings to give users rights only within a specific namespace.
3131
- Avoid providing wildcard permissions when possible, especially to all resources.
3232
As Kubernetes is an extensible system, providing wildcard access gives rights
33-
not just to all object types presently in the cluster, but also to all future object types
33+
not just to all object types present in the cluster, but also to all future object types
3434
which are created in the future.
3535
- Administrators should not use `cluster-admin` accounts except where specifically needed.
3636
Providing a low privileged account with [impersonation rights](/docs/reference/access-authn-authz/authentication/#user-impersonation)
@@ -61,7 +61,7 @@ the RBAC rights provided by default can provide opportunities for security harde
6161
In general, changes should not be made to rights provided to `system:` accounts some options
6262
to harden cluster rights exist:
6363

64-
- Review bindings for the `system:unauthenticated` group and remove where possible, as this gives
64+
- Review bindings for the `system:unauthenticated` group and remove them where possible, as this gives
6565
access to anyone who can contact the API server at a network level.
6666
- Avoid the default auto-mounting of service account tokens by setting
6767
`automountServiceAccountToken: false`. For more details, see
@@ -122,19 +122,19 @@ PersistentVolumes, and constrained users should use PersistentVolumeClaims to ac
122122
### Access to `proxy` subresource of Nodes
123123

124124
Users with access to the proxy sub-resource of node objects have rights to the Kubelet API,
125-
which allows for command execution on every pod on the node(s) which they have rights to.
125+
which allows for command execution on every pod on the node(s) to which they have rights.
126126
This access bypasses audit logging and admission control, so care should be taken before
127127
granting rights to this resource.
128128

129129
### Escalate verb
130130

131-
Generally the RBAC system prevents users from creating clusterroles with more rights than
131+
Generally, the RBAC system prevents users from creating clusterroles with more rights than
132132
they possess. The exception to this is the `escalate` verb. As noted in the [RBAC documentation](/docs/reference/access-authn-authz/rbac/#restrictions-on-role-creation-or-update),
133133
users with this right can effectively escalate their privileges.
134134

135135
### Bind verb
136136

137-
Similar to the `escalate` verb, granting users this right allows for bypass of Kubernetes
137+
Similar to the `escalate` verb, granting users this right allows for the bypass of Kubernetes
138138
in-built protections against privilege escalation, allowing users to create bindings to
139139
roles with rights they do not already have.
140140

0 commit comments

Comments
 (0)