Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Preflight Permission Check for Excessive Permission #1644

Open
bentito opened this issue Jan 22, 2025 · 0 comments
Open

Preflight Permission Check for Excessive Permission #1644

bentito opened this issue Jan 22, 2025 · 0 comments

Comments

@bentito
Copy link
Contributor

bentito commented Jan 22, 2025

Similar to #988, this issue proposes a security-minded preflight permission check that warns when the referenced Service Account is granting more permission than needed for a Cluster Extension to do its work.

Currently, Cluster Extension installations can proceed even if the provided Service Account has excessive permissions. A preflight check would help ensure that Cluster Extensions operate within the principle of least privilege, enhancing the overall security of the cluster.

  • This proposal builds upon previous efforts to define and manage Service Account permissions within Cluster Extensions:

  • A preflight check that analyzes Service Account permissions and flags potential over-privileging would significantly contribute to a more secure Cluster Extension deployment process.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant