Skip to content

Commit

Permalink
Update rules/S6867/kubernetes/rule.adoc
Browse files Browse the repository at this point in the history
Co-authored-by: hendrik-buchwald-sonarsource <64110887+hendrik-buchwald-sonarsource@users.noreply.github.com>
  • Loading branch information
1 parent 39a2846 commit c9b2d0b
Showing 1 changed file with 1 addition and 1 deletion.
2 changes: 1 addition & 1 deletion rules/S6867/kubernetes/rule.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@
Using wildcards when defining Role-Based Access Control (RBAC) permissions in Kubernetes can lead to significant security issues. This is because it grants overly broad permissions, potentially allowing access to sensitive resources.


RBAC is designed to limit the access rights of users within the system by assigning roles to them. These roles define what actions a user can perform and on which resources. When a wildcard is used, it means that the role has access to all resources/verbs, bypassing the principle of least privilege. This principle states that a user should have only the minimal permissions they need to perform their job function.
RBAC is designed to limit the access rights of users within the system by assigning roles to them. These roles define what actions a user can perform and on which resources. When a wildcard is used, it means that the role has access to all resources/verbs, bypassing the principle of least privilege. This principle states that users should have only the minimal permissions they need to perform their job function.


=== What is the potential impact?
Expand Down

0 comments on commit c9b2d0b

Please sign in to comment.