Ensure that Azure Role-Based Access Control (RBAC) is enabled for Azure Kubernetes Service (AKS) clusters. Azure RBAC for Kubernetes Authorization in Azure AKS allows you to control access to Kubernetes resources based on the roles assigned to users or service principals in Azure. It integrates Azure RBAC with Kubernetes' native RBAC, enabling fine-grained permissions for managing AKS resources and operations at both the Azure and Kubernetes levels.
Enabling Azure RBAC for Kubernetes authorization simplifies access management by unifying Azure and Kubernetes permissions. It allows centralized, Role-Based Access Control, ensuring consistent and secure governance across both Azure resources and Kubernetes workloads. This integration helps streamline operations and improves security by reducing the complexity of managing separate permission systems.
Audit
To determine if Azure RBAC for Kubernetes authorization is enabled for Azure AKS clusters, perform the following operations:
Remediation / Resolution
To ensure that Azure Role-Based Access Control (RBAC) for Kubernetes authorization is enabled for your Azure AKS clusters, perform the following operations:
References
- Azure Official Documentation
- Azure RBAC for Kubernetes Authorization
- Use Azure role-based access control for Kubernetes Authorization
- Azure PowerShell Documentation
- az account list
- az account set
- az aks list
- az aks show
- az aks