C 0187
cis-eks-t1.2.0, ClusterScan, cis-aks-t1.2.0, cis-v1.23-t1.0.1, cis-v1.10.0
Severity
High
Description of the the issue
The principle of least privilege recommends that users are provided only the access required for their role and nothing more. The use of wildcard rights grants is likely to provide excessive rights to the Kubernetes API.
Related resources
ClusterRole, ClusterRoleBinding, Role, RoleBinding
What does this control test
Check which subjects have wildcard RBAC permissions.
How to check it manually
Retrieve the roles defined across each namespaces in the cluster and review for wildcards
Retrieve the cluster roles defined in the cluster and review for wildcards
Remediation
Where possible replace any use of wildcards in clusterroles and roles with specific objects or actions.
Impact Statement
Default Value
Example
No example