Skip to content

Commit cc56241

Browse files
waychTim Bannister
andauthored
Update content/en/docs/concepts/security/rbac-good-practices.md
Co-authored-by: Tim Bannister <[email protected]>
1 parent d11408b commit cc56241

File tree

1 file changed

+3
-1
lines changed

1 file changed

+3
-1
lines changed

content/en/docs/concepts/security/rbac-good-practices.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -121,7 +121,9 @@ considered weak.
121121

122122
### Persistent volume creation
123123

124-
Creation of PersistentVolumes includes creation of `hostPath`-typed volumes, providing access to the underlying host filesystem.
124+
If someone - or some application - is allowed to create arbitrary PersistentVolumes, that access
125+
includes the creation of `hostPath` volumes, which then means that a Pod would get access
126+
to the underlying host filesystem(s) on the associated node. Granting that ability is a security risk.
125127

126128
There are many ways a container with unrestricted access to the host filesystem can escalate privileges, including
127129
reading data from other containers, and abusing the credentials of system services, such as Kubelet.

0 commit comments

Comments
 (0)