This product is not supported for your selected Datadog site. ().

Metadata

Id: 249328b8-5f0f-409f-b1dd-029f07882e11

Cloud Provider: Kubernetes

Platform: Kubernetes

Severity: Low

Category: Access Control

Learn More

Description

Ensure that the cluster-admin role is used only where required (RBAC). This rule detects ClusterRoleBinding resources that bind to the cluster-admin role, which grants superuser permissions across the cluster. Such bindings increase risk and should be limited to adhere to the principle of least privilege.

Compliant Code Examples

kind: ClusterRoleBinding
apiVersion: rbac.authorization.k8s.io/v1beta1
metadata:
  name: tiller-clusterrolebinding
subjects:
- kind: ServiceAccount
  name: tiller
  namespace: kube-system
roleRef:
  kind: ClusterRole
  name: view
  apiGroup: ""
# trigger validation

Non-Compliant Code Examples

kind: ClusterRoleBinding
apiVersion: rbac.authorization.k8s.io/v1beta1
metadata:
  name: tiller-clusterrolebinding
subjects:
  - kind: ServiceAccount
    name: tiller
    namespace: kube-system
roleRef:
  kind: ClusterRole
  name: cluster-admin
  apiGroup: ""