You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
We have received concerns regarding the breadth of permissions granted to certain Kubernetes resources within our clusters. To enhance security and ensure the principle of least privilege, we need to evaluate and adjust these permissions to be strictly necessary for the operational requirements of our applications.
Objectives:
Audit Current Permissions: Conduct a thorough review of all Kubernetes resources to identify and document current permissions in the github issue.
Define Necessary Permissions: Establish the minimal permissions required for each resource to function effectively.
Implement Namespace Scoping: Where applicable, adjust permissions to limit their scope to specific namespaces, reducing the potential impact of compromised resources.
Update Documentation: Ensure that all changes and the rationale behind permissions levels are well-documented.
Outcomes
he permissions of Kubernetes resources will be minimized to what is essential for their operation, enhancing our cluster's security posture. Namespace-specific scoping will be applied where beneficial, providing an additional layer of containment and control.
{{- if .Values.enabled }}apiVersion: rbac.authorization.k8s.io/v1kind: ClusterRolemetadata:
name: {{ include "console.fullname" . }}namespace: {{ $.Release.Namespace }}labels:
{{- include "wandb.commonLabels" . | nindent 4 }}{{- include "console.commonLabels" . | nindent 4 }}{{- include "console.labels" . | nindent 4 }}{{- if .Values.clusterRole.labels -}}{{- toYaml .Values.clusterRole.labels | nindent 4 }}{{- end }}annotations:
{{- if .Values.clusterRole.annotations -}}{{- toYaml .Values.clusterRole.annotations | nindent 4 }}{{- end }}rules:
# We can scope these permissions down later
- apiGroups: ["*"]resources: ["*"]verbs: ["*"]{{- end }}
We have received concerns regarding the breadth of permissions granted to certain Kubernetes resources within our clusters. To enhance security and ensure the principle of least privilege, we need to evaluate and adjust these permissions to be strictly necessary for the operational requirements of our applications.
Objectives:
Outcomes
he permissions of Kubernetes resources will be minimized to what is essential for their operation, enhancing our cluster's security posture. Namespace-specific scoping will be applied where beneficial, providing an additional layer of containment and control.
Examples:
Operator
The text was updated successfully, but these errors were encountered: