From CISO Marketplace — the hub for security professionals Visit

Kubernetes RBAC Misconfiguration

Cloud Security

Definition

Overly permissive or incorrectly configured Role-Based Access Control policies in Kubernetes that grant unauthorized access to cluster resources, secrets, API servers, or enable privilege escalation to cluster-admin.

Technical Details

Common K8s RBAC misconfigurations include: overly broad wildcard verbs/resources, cluster-admin bindings for service accounts, default service account token auto-mounting, permissive pod security contexts allowing privilege escalation, and use of system:masters group. Attackers who obtain a pod's service account token with excessive permissions can enumerate, modify, or exfiltrate cluster resources.

Practical Usage

Security teams should regularly audit RBAC policies using tools like kube-bench, Polaris, or rbac-police. Service accounts should follow the least-privilege principle, with `automountServiceAccountToken: false` set for pods that don't require API access. Cluster-admin role bindings should require explicit justification and regular review.

Examples

Related Terms

Container Security Kubernetes Secret Management Cloud-Native Exploits Workload Identity Privilege Escalation
← Back to Glossary