You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
- Change the heading to be more goal-oriented and add an anchor
- Separate list items into 'component' and 'human' users
- Add info about get access and third-party authorization mechanisms for finer control
- Add caution for granting list access
When planning your {{<glossary_tooltip term_id="rbac" text="Role-based Access Control">}} [(RBAC)](/docs/reference/access-authn-authz/rbac/) policies,
36
-
consider the following guidelines for `Secret` objects. You should also follow the other guidelines in [RBAC good practices](/docs/concepts/security/rbac-good-practices).
37
-
38
-
{{< caution >}}
39
-
A user who can create a Pod that uses a Secret can also see the value of that Secret. Even
40
-
if cluster policies do not allow a user to read the Secret directly, the same user could
41
-
have access to run a Pod that then exposes the Secret.
42
-
{{< /caution >}}
43
-
44
-
- Restrict `watch` or `list` access to only the most privileged, system-level
45
-
components.
46
-
- In the API server, objects (including Secrets) are persisted into
0 commit comments