Ensure the default service accounts are not actively used within your OCI Kubernetes Engine (OKE) clusters. This practice allows for precise control, auditing, and review of the specific rights granted to each application.
By default, the Kubernetes default service account is used when a pod lacks a specific one. For any workload needing Kubernetes API access, a custom service account must be defined and granted specific rights. The default service account should be configured to disable its token and remove any inherent permissions.
Audit
To determine if default service accounts are used for your OCI Kubernetes Engine (OKE) cluster, perform the following operations:
Remediation / Resolution
To ensure the default service accounts are not actively used within your OCI Kubernetes Engine (OKE) clusters, perform the following actions:
References
- Oracle Cloud Infrastructure Documentation
- Overview of Kubernetes Engine (OKE)
- Managing Kubernetes Clusters
- Setting Up Cluster Access
- Accessing a Cluster Using Kubectl
- About Access Control and Kubernetes Engine (OKE)
- Oracle Cloud Infrastructure CLI Documentation
- compartment list
- cluster list
- cluster create-kubeconfig
- Kubernetes Documentation
- Using RBAC Authorization