RBAC roles with read secrets permissions
이 페이지는 아직 한국어로 제공되지 않습니다. 번역 작업 중입니다.
현재 번역 프로젝트에 대한 질문이나 피드백이 있으신 경우
언제든지 연락주시기 바랍니다.Id: 826abb30-3cd5-4e0b-a93b-67729b4f7e63
Cloud Provider: Kubernetes
Platform: Terraform
Severity: Medium
Category: Access Control
Learn More
Description
Roles and ClusterRoles that grant ‘get’, ‘watch’, or ’list’ RBAC permissions on Kubernetes ‘secrets’ are dangerous and should not include such permissions. If compromised, these roles can be used to access sensitive data such as passwords, tokens, and keys. This rule flags Role and ClusterRole resources that include rules with ‘secrets’ in their resources field together with any of the read verbs (‘get’, ‘watch’, ’list’).
Compliant Code Examples
resource "kubernetes_role" "example1" {
metadata {
name = "terraform-example1"
labels = {
test = "MyRole"
}
}
rule {
api_groups = [""]
resources = ["pods"]
resource_names = ["foo"]
verbs = ["get", "list", "watch"]
}
rule {
api_groups = ["apps"]
resources = ["deployments"]
verbs = ["get", "list"]
}
}
resource "kubernetes_cluster_role" "example2" {
metadata {
name = "terraform-example2"
}
rule {
api_groups = [""]
resources = ["namespaces", "pods"]
verbs = ["get", "list", "watch"]
}
}
Non-Compliant Code Examples
resource "kubernetes_role" "example1" {
metadata {
name = "terraform-example1"
labels = {
test = "MyRole"
}
}
rule {
api_groups = [""]
resources = ["secrets", "namespaces"]
resource_names = ["foo"]
verbs = ["get", "list", "watch"]
}
rule {
api_groups = ["apps"]
resources = ["deployments"]
verbs = ["get", "list"]
}
}
resource "kubernetes_cluster_role" "example2" {
metadata {
name = "terraform-example2"
}
rule {
api_groups = [""]
resources = ["namespaces", "secrets"]
verbs = ["get", "list", "watch"]
}
rule {
api_groups = ["apps"]
resources = ["deployments"]
verbs = ["get", "list"]
}
}
resource "kubernetes_role" "example3" {
metadata {
name = "terraform-example3"
labels = {
test = "MyRole"
}
}
rule {
api_groups = [""]
resources = ["secrets", "namespaces"]
resource_names = ["foo"]
verbs = ["get", "list", "watch"]
}
}
resource "kubernetes_cluster_role" "example4" {
metadata {
name = "terraform-example4"
}
rule {
api_groups = [""]
resources = ["namespaces", "secrets"]
verbs = ["get", "list", "watch"]
}
}