Skip to content

Commit d11408b

Browse files
committed
Update RBAC Good Practices for PersistentVolumes
The docs previously referred to the reader to the now defunct PodSecurityPolicy page to explain how PersistentVolumes can be a path of privilege escalation, burrying the lede. Now that PodSecurityPolicy is gone, update this bit to actually explain that it it is unfettered access to creating hostPath-typed PersistentVolumes that are a problem. Some words lifted from the 1.24 PodSecurityPolicy docs. Signed-off-by: Mike Waychison <[email protected]>
1 parent 768d592 commit d11408b

File tree

1 file changed

+6
-2
lines changed

1 file changed

+6
-2
lines changed

content/en/docs/concepts/security/rbac-good-practices.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -121,8 +121,12 @@ considered weak.
121121

122122
### Persistent volume creation
123123

124-
As noted in the [PodSecurityPolicy](/docs/concepts/security/pod-security-policy/#volumes-and-file-systems)
125-
documentation, access to create PersistentVolumes can allow for escalation of access to the underlying host.
124+
Creation of PersistentVolumes includes creation of `hostPath`-typed volumes, providing access to the underlying host filesystem.
125+
126+
There are many ways a container with unrestricted access to the host filesystem can escalate privileges, including
127+
reading data from other containers, and abusing the credentials of system services, such as Kubelet.
128+
129+
Only trusted users should be granted permission to create PersistentVolume objects.
126130
Where access to persistent storage is required trusted administrators should create
127131
PersistentVolumes, and constrained users should use PersistentVolumeClaims to access that storage.
128132

0 commit comments

Comments
 (0)