Skip to content

Commit 3f990cd

Browse files
committed
Add Namespace Labelling to RBAC good practice
1 parent 898cbe1 commit 3f990cd

File tree

1 file changed

+7
-0
lines changed

1 file changed

+7
-0
lines changed

content/en/docs/concepts/security/rbac-good-practices.md

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -181,6 +181,13 @@ Users with control over `validatingwebhookconfigurations` or `mutatingwebhookcon
181181
can control webhooks that can read any object admitted to the cluster, and in the case of
182182
mutating webhooks, also mutate admitted objects.
183183

184+
### Namespace modification
185+
186+
Users who can perform `patch` operations on `namespace` objects through a namespaced rolebinding can modify
187+
labels on that namespace. In clusters where Pod Security Admission is used, this may allow a user to configure the namespace
188+
for a more permissive policy than intended by the administrators. For clusters where network policy is used, users may be
189+
able to gain access to services intended to be blocked.
190+
184191
## Kubernetes RBAC - denial of service risks {#denial-of-service-risks}
185192

186193
### Object creation denial-of-service {#object-creation-dos}

0 commit comments

Comments
 (0)