Back to all scenarios
Scenario #292
Security
Kubernetes v1.24, EKS

Escalation via Editable Validating WebhookConfiguration

User with edit rights on a validating webhook modified it to bypass critical security policies.

Find this helpful?
What Happened

An internal user reconfigured the webhook to always return allow, disabling cluster-wide security checks.

Diagnosis Steps
  • 1Detected anomaly: privileged pods getting deployed.
  • 2Checked webhook configuration history in GitOps.
  • 3Verified that failurePolicy: Ignore and static allow logic were added.
Root Cause

Lack of control over webhook configuration permissions.

Fix/Workaround
• Restricted access to ValidatingWebhookConfiguration objects.
• Added checksums to webhook definitions in GitOps.
Lessons Learned

Webhooks must be tightly controlled to preserve cluster security.

How to Avoid
  • 1Lock down RBAC access to webhook configurations.
  • 2Monitor changes with alerts and diff checks.