Skip to content

Commit 1ed331c

Browse files
smarticu5Tim Bannister
andauthored
Update content/en/docs/concepts/security/rbac-good-practices.md
Co-authored-by: Tim Bannister <[email protected]>
1 parent 3f990cd commit 1ed331c

File tree

1 file changed

+3
-2
lines changed

1 file changed

+3
-2
lines changed

content/en/docs/concepts/security/rbac-good-practices.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -185,8 +185,9 @@ mutating webhooks, also mutate admitted objects.
185185

186186
Users who can perform `patch` operations on `namespace` objects through a namespaced rolebinding can modify
187187
labels on that namespace. In clusters where Pod Security Admission is used, this may allow a user to configure the namespace
188-
for a more permissive policy than intended by the administrators. For clusters where network policy is used, users may be
189-
able to gain access to services intended to be blocked.
188+
for a more permissive policy than intended by the administrators.
189+
For clusters where NetworkPolicy is used, users may be set labels that indirectly allow
190+
access to services that an administrator did not intend to allow.
190191

191192
## Kubernetes RBAC - denial of service risks {#denial-of-service-risks}
192193

0 commit comments

Comments
 (0)