Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

disable rolebinding to default service account #77

Open
NissesSenap opened this issue May 29, 2022 · 0 comments
Open

disable rolebinding to default service account #77

NissesSenap opened this issue May 29, 2022 · 0 comments

Comments

@NissesSenap
Copy link
Contributor

Our general users have the possibility of creating rolebindings and roles in there tenant namespace.
This is fine but we should create a OPA rule that says that it's impossible to use bind a rolebinding to the default service account.

This to lower the risk of someone giving the account more access and another pod that is using the default service account also gains the same access.
If you as a user have a use-case to setup rbac rules for a service account you should know enough to create a service account as well and use that in your deployment.

Another option could also be to disable the usage of default service account all together but I think that will create to much issues vs the value it gives us. We have already disabled mounting the service account token by default on all our pods.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant