Skip to content

Commit 3eb9334

Browse files
author
SzymonPrzepiora
committed
suggested changes
1 parent 1b90f44 commit 3eb9334

File tree

1 file changed

+2
-3
lines changed

1 file changed

+2
-3
lines changed

content/en/docs/concepts/security/rbac-good-practices.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ some general rules that can be applied are :
3030
ClusterRoleBindings to give users rights only within a specific namespace.
3131
- Avoid providing wildcard permissions when possible, especially to all resources.
3232
As Kubernetes is an extensible system, providing wildcard access gives rights
33-
not just to all object types present in the cluster, but also to all future object types
33+
not just to all object types that currently exist in the cluster, but also to all future object types
3434
which are created in the future.
3535
- Administrators should not use `cluster-admin` accounts except where specifically needed.
3636
Providing a low privileged account with [impersonation rights](/docs/reference/access-authn-authz/authentication/#user-impersonation)
@@ -128,8 +128,7 @@ granting rights to this resource.
128128

129129
### Escalate verb
130130

131-
Generally, the RBAC system prevents users from creating clusterroles with more rights than
132-
they possess. The exception to this is the `escalate` verb. As noted in the [RBAC documentation](/docs/reference/access-authn-authz/rbac/#restrictions-on-role-creation-or-update),
131+
Generally, the RBAC system prevents users from creating clusterroles with more rights than the user possesses. The exception to this is the `escalate` verb. As noted in the [RBAC documentation](/docs/reference/access-authn-authz/rbac/#restrictions-on-role-creation-or-update),
133132
users with this right can effectively escalate their privileges.
134133

135134
### Bind verb

0 commit comments

Comments
 (0)