Skip to content

Commit d077988

Browse files
committed
Further updates to clarify language
1 parent 5c9af80 commit d077988

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

content/en/docs/concepts/security/rbac-good-practices.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -130,10 +130,10 @@ reading data from other containers, and abusing the credentials of system servic
130130

131131
You should only allow access to create PersistentVolume objects for:
132132

133-
- users (cluster operators) that need this access for their work, and who you trust
134-
- the Kubernetes control plane, which creates PersistentVolumes based on PersistentVolumeClaims
133+
- users (cluster operators) that need this access for their work, and who you trust,
134+
- the Kubernetes control plane components which creates PersistentVolumes based on PersistentVolumeClaims
135135
that are configured for automatic provisioning.
136-
(Kubernetes usually sets up that access for the control plane when you deploy a cluster).
136+
This is usually setup by the Kubernetes provider or by the operator when installing a CSI driver.
137137

138138
Where access to persistent storage is required trusted administrators should create
139139
PersistentVolumes, and constrained users should use PersistentVolumeClaims to access that storage.

0 commit comments

Comments
 (0)