Skip to content

Commit a49c7b1

Browse files
authored
Merge pull request #33961 from harshitasao/issue-33696
Modify RBAC good practice guide
2 parents 571ae1d + 2517ad6 commit a49c7b1

File tree

1 file changed

+7
-3
lines changed

1 file changed

+7
-3
lines changed

content/en/docs/concepts/security/rbac-good-practices.md

Lines changed: 7 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -37,13 +37,14 @@ some general rules that can be applied are :
3737
can avoid accidental modification of cluster resources.
3838
- Avoid adding users to the `system:masters` group. Any user who is a member of this group
3939
bypasses all RBAC rights checks and will always have unrestricted superuser access, which cannot be
40-
revoked by removing Role Bindings or Cluster Role Bindings. As an aside, if a cluster is
40+
revoked by removing RoleBindings or ClusterRoleBindings. As an aside, if a cluster is
4141
using an authorization webhook, membership of this group also bypasses that webhook (requests
4242
from users who are members of that group are never sent to the webhook)
4343

4444
### Minimize distribution of privileged tokens
4545

46-
Ideally, pods shouldn't be assigned service accounts granted powerful permissions (listed [here](#Kubernetes-RBAC---Privilege-Escalation-Risks)).
46+
Ideally, pods shouldn't be assigned service accounts that have been granted powerful permissions (for example, any of the rights listed under
47+
[privilege escalation risks](#privilege-escalation-risks)).
4748
In cases where a workload requires powerful permissions, consider the following practices:
4849

4950
- Limit the number of nodes running powerful pods. Ensure that any DaemonSets you run
@@ -172,4 +173,7 @@ specifically relevant in multi-tenant clusters if semi-trusted or untrusted user
172173
are allowed limited access to a system.
173174

174175
One option for mitigation of this issue would be to use [resource quotas](/docs/concepts/policy/resource-quotas/#object-count-quota)
175-
to limit the quantity of objects which can be created.
176+
to limit the quantity of objects which can be created.
177+
178+
## {{% heading "whatsnext" %}}
179+
* To learn more about RBAC, see the [RBAC documentation](/docs/reference/access-authn-authz/rbac/).

0 commit comments

Comments
 (0)