Skip to content

Commit 5e8ee7d

Browse files
authored
Merge pull request #45664 from smarticu5/main
Add Namespace Patching to RBAC good practice
2 parents cd5e6b8 + 54e1d33 commit 5e8ee7d

File tree

1 file changed

+8
-0
lines changed

1 file changed

+8
-0
lines changed

content/en/docs/concepts/security/rbac-good-practices.md

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -181,6 +181,14 @@ Users with control over `validatingwebhookconfigurations` or `mutatingwebhookcon
181181
can control webhooks that can read any object admitted to the cluster, and in the case of
182182
mutating webhooks, also mutate admitted objects.
183183

184+
### Namespace modification
185+
186+
Users who can perform **patch** operations on Namespace objects (through a namespaced RoleBinding to a Role with that access) can modify
187+
labels on that namespace. In clusters where Pod Security Admission is used, this may allow a user to configure the namespace
188+
for a more permissive policy than intended by the administrators.
189+
For clusters where NetworkPolicy is used, users may be set labels that indirectly allow
190+
access to services that an administrator did not intend to allow.
191+
184192
## Kubernetes RBAC - denial of service risks {#denial-of-service-risks}
185193

186194
### Object creation denial-of-service {#object-creation-dos}

0 commit comments

Comments
 (0)