Back to all scenarios
Scenario #70
Cluster Management
K8s v1.22, AWS EKS

Unauthorized Access to Cluster Resources Due to RBAC Misconfiguration

Unauthorized users gained access to sensitive resources due to misconfigured RBAC roles and bindings.

Find this helpful?
What Happened

An RBAC misconfiguration allowed unauthorized users to access cluster resources, including secrets.

Diagnosis Steps
  • 1Checked RBAC policies and found overly permissive role bindings.
  • 2Analyzed user access logs and identified unauthorized access to sensitive resources.
Root Cause

Over-permissive RBAC role bindings granted excessive access to unauthorized users.

Fix/Workaround
• Corrected RBAC policies to restrict access.
• Audited user access and removed unauthorized permissions.
Lessons Learned

Proper RBAC configuration is crucial for securing cluster resources.

How to Avoid
  • 1Implement the principle of least privilege for RBAC roles.
  • 2Regularly audit RBAC policies and bindings.