Enforce the Principle of Least Privilege (POLP) for users creating pods within your OCI Kubernetes Engine (OKE) clusters. The ability to create pods can enable privilege escalation by assigning privileged service accounts or mounting sensitive host volumes.
The capability to create pods in an OCI Kubernetes Engine (OKE) cluster must be tightly controlled due to its potential for privilege escalation. Granting this access unnecessarily increases the security risk, as users could assign privileged service accounts or mount host volumes with sensitive data. Enforce the Principle of Least Privilege (POLP) and restrict pod creation wherever possible.
Audit
To determine if the ability to create pods is restricted across your OCI Kubernetes Engine (OKE) cluster, perform the following operations:
Remediation / Resolution
To implement the Principle of Least Privilege (POLP), ensure that pod creation access is restricted across your OCI Kubernetes Engine (OKE) clusters. This can be achieved by revoking the pod creation privilege from all non-privileged users and service accounts:
References
- Oracle Cloud Infrastructure Documentation
- Overview of Kubernetes Engine (OKE)
- Managing Kubernetes Clusters
- Setting Up Cluster Access
- Accessing a Cluster Using Kubectl
- About Access Control and Kubernetes Engine (OKE)
- Oracle Cloud Infrastructure CLI Documentation
- compartment list
- cluster list
- cluster create-kubeconfig
- Kubernetes Documentation
- Using RBAC Authorization