You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository was archived by the owner on Apr 10, 2025. It is now read-only.
Copy file name to clipboardExpand all lines: README.md
+8-4Lines changed: 8 additions & 4 deletions
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@ Retrieve the RBAC permissions of Kubernetes identities - service accounts, pods,
3
3
4
4

5
5
6
-
The [policy library](./lib) includes ~20 policies that identify identities possessing risky permissions, each detecting a different attack path. See the Recommendations section [here](https://www.paloaltonetworks.com/resources/whitepapers/kubernetes-privilege-escalation-excessive-permissions-in-popular-platforms) for advice on addressing powerful permissions in Kubernetes clusters.
6
+
The [policy library](./lib) includes over 20 policies that detect identities possessing risky permissions, each alerting on a different attack path.
7
7
8
8
## Quick Start
9
9
@@ -31,18 +31,22 @@ The [policy library](./lib) includes ~20 policies that identify identities posse
31
31
```
32
32
./rbac-police eval lib/
33
33
```
34
+
5. Inspect the permissions of violating principals and identify the Roles and ClusterRoles granting them risky privileges. See the Recommendations section [here](https://www.paloaltonetworks.com/resources/whitepapers/kubernetes-privilege-escalation-excessive-permissions-in-popular-platforms) for remediation advice.
Improve accuracy by considering features gates and admission controllers that can protect against certain attacks. Note that [NodeRestriction](https://kubernetes.io/docs/reference/access-authn-authz/admission-controllers/#noderestriction) is identified by impersonating a node and *dry-run creating a pod*, which may be logged by some systems.
@@ -53,7 +57,7 @@ Improve accuracy by considering features gates and admission controllers that ca
53
57
Control which identities are evaluated for violations, default are `sa,node,combined` (see [policies.md](docs/policies.md) for more information).
54
58
```
55
59
./rbac-police eval lib/ --violations sa,user
56
-
./rbac-police eval lib/ --violations all # sa,node,combined,user,group
60
+
./rbac-police eval lib/ --violations all # sa,node,combined,user,group
57
61
```
58
62
Note that by default, `rbac-police` only looks into service accounts assigned to a pod. Use `-a` to include all service accounts.
0 commit comments