Back to all scenarios
Scenario #230
Security
K8s v1.19, On-Premise

Misconfigured RBAC Allowing Cluster Admin Privileges to Developers

Developers were mistakenly granted cluster admin privileges due to misconfigured RBAC roles, which gave them the ability to modify sensitive resources.

Find this helpful?
What Happened

The RBAC configuration allowed developers to assume roles with cluster admin privileges, enabling them to access and modify sensitive resources, including secrets and critical configurations.

Diagnosis Steps
  • 1Reviewed RBAC roles and bindings and found that developers had been granted roles with broader privileges than required.
  • 2Examined audit logs to confirm that developers had accessed resources outside of their designated scope.
Root Cause

Misconfigured RBAC roles allowed developers to acquire cluster admin privileges, leading to unnecessary access to sensitive resources.

Fix/Workaround
• Reconfigured RBAC roles to follow the principle of least privilege and removed cluster admin permissions for developers.
• Implemented role separation to ensure developers only had access to resources necessary for their tasks.
Lessons Learned

Always follow the principle of least privilege when assigning roles, and regularly audit RBAC configurations to prevent privilege escalation.

How to Avoid
  • 1Regularly review and audit RBAC configurations to ensure that only the minimum necessary permissions are granted to each user.
  • 2Use namespaces and role-based access controls to enforce separation of duties and limit access to sensitive resources.