Ensure that access to secrets is restricted across your OCI Kubernetes Engine (OKE) clusters as the Kubernetes API stores sensitive data, such as service account tokens or workload credentials. Restricting access to secrets is vital for reducing privilege escalation risk.
Unauthorized access to Kubernetes secrets enables an attacker to gain further access to the OKE cluster or exploit external resources whose credentials are exposed, thus leading to potential data theft, service disruption, or system compromise.
Audit
To determine if the access to secrets is restricted across your OCI Kubernetes Engine (OKE) clusters, perform the following operations:
Remediation / Resolution
To implement the Principle of Least Privilege (POLP), ensure that access to secrets is restricted across your OCI Kubernetes Engine (OKE) clusters. This can be achieved by removing or preventing the get, list, and watch permissions on secret objects for non-privileged users and service accounts:
References
- Oracle Cloud Infrastructure Documentation
- Overview of Kubernetes Engine (OKE)
- Managing Kubernetes Clusters
- Setting Up Cluster Access
- Accessing a Cluster Using Kubectl
- About Access Control and Kubernetes Engine (OKE)
- Oracle Cloud Infrastructure CLI Documentation
- compartment list
- cluster list
- cluster create-kubeconfig
- Kubernetes Documentation
- Using RBAC Authorization