Should I Remove ‘admin’ and ‘edit’ Roles in My K8s Cluster?

0
1
Asked By TechExplorer42 On

I got some security feedback suggesting that we shouldn't assign 'bind', 'escalate', or 'impersonate' permissions to any principals. The most notable roles mentioned were 'admin' and 'edit'. I'm considering removing these roles and switching to custom roles that grant only the necessary privileges. However, I'm a bit of a beginner when it comes to Kubernetes security, and I'm wondering if completely removing these roles is a good move. Would it complicate things for us down the line? Is this a common best practice to follow? Thanks in advance!

2 Answers

Answered By DevGuru987 On

I wouldn’t recommend deleting the admin role. Just don't role-bind it and opt for a custom role instead. Keeping the admin role around can be beneficial even if you don’t actively use it.

Answered By K8sNinja123 On

Creating custom roles with minimal permissions is definitely the right approach. Just make sure to thoroughly create and test those custom roles before you remove the existing 'admin' and 'edit' roles. By the way, if your developers have admin permissions, consider limiting those as well—it's best to hide admin access behind a more secure method.

TechExplorer42 -

Thanks! I'm all in on using custom roles for the least privilege. Just wasn't sure if removing the 'admin' role might cause major issues since I'm still learning about K8s.

Related Questions

LEAVE A REPLY

Please enter your comment!
Please enter your name here

This site uses Akismet to reduce spam. Learn how your comment data is processed.