Remove kubernetes-rbac
article thumbnail

First-Ever Attack Leveraging Kubernetes RBAC to Backdoor Clusters

Aqua Security

We have recently discovered the first-ever evidence that attackers are exploiting Kubernetes (K8s) Role-Based Access Control (RBAC) in the wild to create backdoors. The attackers also deployed DaemonSets to take over and hijack resources of the K8s clusters they attack.

Research 145
article thumbnail

What Is Kubernetes RBAC and Why Do You Need It?

Dzone - DevOps

What Is Kubernetes RBAC? Often, when organizations start their Kubernetes journey, they look up to implementing least privilege roles and proper authorization to secure their infrastructure. Kubernetes RBAC provides the ability to control who can access each API resource with what kind of access.

Storage 87
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

RBAC Virtual Verbs: Teaching Kubernetes to Educate Dolphins

Aqua Security

Kubernetes’ role-based access control (RBAC) system is a cornerstone of cluster security. Most clusters use RBAC to determine which users have access to specific operations, and its core elements are well covered in the Kubernetes documentation.

article thumbnail

Implementing Stronger RBAC and Multitenancy in Kubernetes Using Istio

Dzone - DevOps

Background of Multitenancy DevOps and solution architects often implement RBAC and multitenancy in their Kubernetes infrastructure to achieve isolation of workspace and allow authorized persons to access resources with least privilege resources.

DevOps 69
article thumbnail

Privilege Escalation from Node/Proxy Rights in Kubernetes RBAC

Aqua Security

One of the side effects of Kubernetes’ rich API and extensive functionality is that sometimes there are security implications to granting users permissions. Security architects should be aware of these side effects when designing platforms that use Kubernetes.

Research 145
article thumbnail

Kubernetes RBAC: How to Avoid Privilege Escalation via Certificate Signing

Aqua Security

Following on from our previous post on the risks of privilege escalation in Kubernetes via the node/proxy resource, we’re going to take a look at how users who have rights to the certificate signing request (CSR) API in Kubernetes might be able to use them to escalate their privileges in a cluster.

How To 130
article thumbnail

Taking Control of Kubernetes: Enforcing Least Privilege to Secure Your Kubernetes Environment

Tenable

Kubernetes has become the de facto standard for managing containerized workloads in private and public clouds. Here we examine the challenges involved and explain how to protect your Kubernetes environment by enforcing least privilege across all deployments – whether on-premises or hosted in the public cloud.