The presentation discusses the importance of role-based access control (RBAC) in Kubernetes and the potential security risks associated with overly permissive RBAC configurations. It also highlights the need for fine-grained configuration and least privilege access.
- RBAC is a collection of users, resources, and operations that are combined to give access to the resources needed
- Fine-grained configuration is necessary to limit access to service accounts and humans
- Least privilege access is important to ensure that only necessary access is granted
- Audit logs can be used to craft better RBAC policies
- Escalate, impersonate, and bind verbs are dangerous and should be monitored
- Persistent volumes can be used to break out of the container context and access the underlying host