@@ -37,13 +37,14 @@ some general rules that can be applied are :
37
37
can avoid accidental modification of cluster resources.
38
38
- Avoid adding users to the ` system:masters ` group. Any user who is a member of this group
39
39
bypasses all RBAC rights checks and will always have unrestricted superuser access, which cannot be
40
- revoked by removing Role Bindings or Cluster Role Bindings . As an aside, if a cluster is
40
+ revoked by removing RoleBindings or ClusterRoleBindings . As an aside, if a cluster is
41
41
using an authorization webhook, membership of this group also bypasses that webhook (requests
42
42
from users who are members of that group are never sent to the webhook)
43
43
44
44
### Minimize distribution of privileged tokens
45
45
46
- Ideally, pods shouldn't be assigned service accounts granted powerful permissions (listed [ here] ( #Kubernetes-RBAC---Privilege-Escalation-Risks ) ).
46
+ Ideally, pods shouldn't be assigned service accounts that have been granted powerful permissions (for example, any of the rights listed under
47
+ [ privilege escalation risks] ( #privilege-escalation-risks ) ).
47
48
In cases where a workload requires powerful permissions, consider the following practices:
48
49
49
50
- Limit the number of nodes running powerful pods. Ensure that any DaemonSets you run
@@ -172,4 +173,7 @@ specifically relevant in multi-tenant clusters if semi-trusted or untrusted user
172
173
are allowed limited access to a system.
173
174
174
175
One option for mitigation of this issue would be to use [ resource quotas] ( /docs/concepts/policy/resource-quotas/#object-count-quota )
175
- to limit the quantity of objects which can be created.
176
+ to limit the quantity of objects which can be created.
177
+
178
+ ## {{% heading "whatsnext" %}}
179
+ * To learn more about RBAC, see the [ RBAC documentation] ( /docs/reference/access-authn-authz/rbac/ ) .
0 commit comments