Use Azure Role-Based Access Control (RBAC) to control access to the Azure Kubernetes Service (AKS) cluster configuration file and prevent unauthorized users from controlling the cluster. This helps protect against security breaches, data exposure, and disruptions to critical workloads. Azure RBAC allows you to control who can retrieve the cluster configuration file (i.e. kubeconfig) and what permissions they have within the cluster. You can assign two Azure roles to Microsoft Entra users or groups for this purpose: Azure Kubernetes Service Cluster Admin Role and Azure Kubernetes Service Cluster User Role.
excellence
Protecting kubeconfig is essential for security. The kubeconfig file contains credentials and connection details that allow users to interact with the Kubernetes cluster. If unauthorized individuals gain access, they could manipulate or compromise the cluster, leading to data breaches or disruptions. By using Azure Role-Based Access Control (RBAC), organizations can control who can access the kubeconfig file and what permissions they have, ensuring that only authorized users can interact with the cluster securely.
Audit
To determine if the access to your AKS cluster configuration file is controlled using Azure RBAC, perform the following operations:
Remediation / Resolution
To ensure that access to your Azure Kubernetes Service (AKS) cluster configuration file is controlled using Azure RBAC, perform the following operations:
References
- Azure Official Documentation
- Security concepts for applications and clusters in Azure Kubernetes Service (AKS)
- Use Azure role-based access control to define access to the Kubernetes configuration file in Azure Kubernetes Service (AKS)
- Azure PowerShell Documentation
- az account list
- az account set
- az aks list
- az role assignment list
- az role assignment create