Back to all scenarios
Scenario #285
Security
Kubernetes v1.21, AKS
Cluster Admin Bound to All Authenticated Users
A ClusterRoleBinding accidentally granted cluster-admin to all authenticated users due to system:authenticated group.
Find this helpful?
What Happened
A misconfigured YAML granted admin access broadly, bypassing intended RBAC restrictions.
Diagnosis Steps
- 1Audited ClusterRoleBindings.
- 2Found binding: subjects: kind: Group, name: system:authenticated.
- 3Verified users could create/delete resources cluster-wide.
Root Cause
RBAC misconfiguration during onboarding automation.
Fix/Workaround
• Deleted the binding immediately.
• Implemented an RBAC policy validation webhook.
Lessons Learned
Misuse of built-in groups can be catastrophic.
How to Avoid
- 1Avoid using broad group bindings.
- 2Implement pre-commit checks for RBAC files.