Skip to content

Commit 59bac98

Browse files
authored
Merge pull request #34210 from Paszymaja/patch-1
Fixed typos and readability improvements in Role Based Access Control Good Practices
2 parents f1f8240 + 30eb2cc commit 59bac98

File tree

1 file changed

+8
-9
lines changed

1 file changed

+8
-9
lines changed

content/en/docs/concepts/security/rbac-good-practices.md

Lines changed: 8 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -24,15 +24,15 @@ The good practices laid out here should be read in conjunction with the general
2424

2525
### Least privilege
2626

27-
Ideally minimal RBAC rights should be assigned to users and service accounts. Only permissions
28-
explicitly required for their operation should be used. Whilst each cluster will be different,
27+
Ideally, minimal RBAC rights should be assigned to users and service accounts. Only permissions
28+
explicitly required for their operation should be used. While each cluster will be different,
2929
some general rules that can be applied are :
3030

3131
- Assign permissions at the namespace level where possible. Use RoleBindings as opposed to
3232
ClusterRoleBindings to give users rights only within a specific namespace.
3333
- Avoid providing wildcard permissions when possible, especially to all resources.
3434
As Kubernetes is an extensible system, providing wildcard access gives rights
35-
not just to all object types presently in the cluster, but also to all future object types
35+
not just to all object types that currently exist in the cluster, but also to all future object types
3636
which are created in the future.
3737
- Administrators should not use `cluster-admin` accounts except where specifically needed.
3838
Providing a low privileged account with
@@ -66,7 +66,7 @@ the RBAC rights provided by default can provide opportunities for security harde
6666
In general, changes should not be made to rights provided to `system:` accounts some options
6767
to harden cluster rights exist:
6868

69-
- Review bindings for the `system:unauthenticated` group and remove where possible, as this gives
69+
- Review bindings for the `system:unauthenticated` group and remove them where possible, as this gives
7070
access to anyone who can contact the API server at a network level.
7171
- Avoid the default auto-mounting of service account tokens by setting
7272
`automountServiceAccountToken: false`. For more details, see
@@ -129,20 +129,19 @@ PersistentVolumes, and constrained users should use PersistentVolumeClaims to ac
129129
### Access to `proxy` subresource of Nodes
130130

131131
Users with access to the proxy sub-resource of node objects have rights to the Kubelet API,
132-
which allows for command execution on every pod on the node(s) which they have rights to.
132+
which allows for command execution on every pod on the node(s) to which they have rights.
133133
This access bypasses audit logging and admission control, so care should be taken before
134134
granting rights to this resource.
135135

136136
### Escalate verb
137137

138-
Generally the RBAC system prevents users from creating clusterroles with more rights than
139-
they possess. The exception to this is the `escalate` verb. As noted in the
140-
[RBAC documentation](/docs/reference/access-authn-authz/rbac/#restrictions-on-role-creation-or-update),
138+
Generally, the RBAC system prevents users from creating clusterroles with more rights than the user possesses.
139+
The exception to this is the `escalate` verb. As noted in the [RBAC documentation](/docs/reference/access-authn-authz/rbac/#restrictions-on-role-creation-or-update),
141140
users with this right can effectively escalate their privileges.
142141

143142
### Bind verb
144143

145-
Similar to the `escalate` verb, granting users this right allows for bypass of Kubernetes
144+
Similar to the `escalate` verb, granting users this right allows for the bypass of Kubernetes
146145
in-built protections against privilege escalation, allowing users to create bindings to
147146
roles with rights they do not already have.
148147

0 commit comments

Comments
 (0)