Ensure that Kubernetes Role-Based Access Control (RBAC) authorization is enabled for all ACK clusters in order to achieve fine-grained control over ACK cluster resources. The Kubernetes Role-Based Access Control (RBAC) represents an efficient method of regulating access to ACK cluster resources based on the roles of individual users or groups within an organization.
In Kubernetes, Role-Based Access Control (RBAC) authorization is used to grant permissions to resources at the cluster and namespace level. RBAC enables you to delineate roles featuring sets of permissions, and those roles are then assigned to subaccounts, restricting their access to only the specified resources within the cluster or namespaces as dictated by the RBAC policies. In Container Service for Kubernetes (ACK), it is important to deactivate the legacy authorizer and use RBAC authorization instead. As Role-Based Access Control (RBAC) offers notable security benefits, it is strongly recommended to enable RBAC authorization for your ACK clusters.
Audit
To determine if RBAC authorization is enabled for your ACK clusters, perform the following operations:
Getting RBAC authorization information via Alibaba Cloud CLI (aliyun) is not currently supported.Remediation / Resolution
To enable RBAC authorization for your ACK clusters by granting appropriate RBAC permissions to RAM users or RAM roles, perform the following operations:
Enabling RBAC authorization for ACK clusters via Alibaba Cloud CLI (aliyun) is not currently supported.References
- Alibaba Cloud Documentation
- Best Practices
- Grant RBAC permissions to RAM users or RAM roles
- ACK roles