Skip to content

Audit and Minimize RBAC Permissions #3681

@zhanggbj

Description

@zhanggbj

CAPV controllers currently appear to have Kubernetes RBAC permissions defined that are not strictly necessary for the controller's actual operational logic. These unused permissions introduce security concerns.

To adhere to the principle of least privilege, we should audit our existing cluster roles and bindings and trim them down to only the resources and verbs that are actively consumed by the controller processes.

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions