File tree Expand file tree Collapse file tree 1 file changed +7
-1
lines changed
content/en/docs/concepts/security Expand file tree Collapse file tree 1 file changed +7
-1
lines changed Original file line number Diff line number Diff line change @@ -128,7 +128,13 @@ to the underlying host filesystem(s) on the associated node. Granting that abili
128
128
There are many ways a container with unrestricted access to the host filesystem can escalate privileges, including
129
129
reading data from other containers, and abusing the credentials of system services, such as Kubelet.
130
130
131
- Only trusted users should be granted permission to create PersistentVolume objects.
131
+ You should only allow access to create PersistentVolume objects for:
132
+
133
+ - users (cluster operators) that need this access for their work, and who you trust
134
+ - the Kubernetes control plane, which creates PersistentVolumes based on PersistentVolumeClaims
135
+ that are configured for automatic provisioning.
136
+ (Kubernetes usually sets up that access for the control plane when you deploy a cluster).
137
+
132
138
Where access to persistent storage is required trusted administrators should create
133
139
PersistentVolumes, and constrained users should use PersistentVolumeClaims to access that storage.
134
140
You can’t perform that action at this time.
0 commit comments