Ensure that the use of the "cluster-admin" role is restricted across your OCI Kubernetes Engine (OKE) clusters as this RBAC role grants wide-ranging, unrestricted powers over the entire environment and must only be used where and when absolutely necessary to enforce the Principle of Least Privilege (POLP).
In Kubernetes, the "cluster-admin" role grant super-user access with wide-ranging privileges. This role allows a principal to perform any action on any resource across all namespaces. For security and compliance purposes, the "cluster-admin" role application must be strictly limited to required situations.
Audit
To determine if the use of the "cluster-admin" role is restricted across your OCI Kubernetes Engine (OKE) cluster, perform the following operations:
Remediation / Resolution
To ensure that the use of the "cluster-admin" role is restricted across the OCI Kubernetes Engine (OKE) cluster, perform the following operations:
References
- Oracle Cloud Infrastructure Documentation
- Overview of Kubernetes Engine (OKE)
- Managing Kubernetes Clusters
- Setting Up Cluster Access
- Accessing a Cluster Using Kubectl
- About Access Control and Kubernetes Engine (OKE)
- Oracle Cloud Infrastructure CLI Documentation
- compartment list
- cluster list
- cluster create-kubeconfig
- Kubernetes Documentation
- Using RBAC Authorization