💼 4.1 RBAC and Service Accounts
- ID:
/frameworks/cis-gke-v1.8.0/04/01
Description​
Empty...
Similar​
Sub Sections​
| Section | Sub Sections | Internal Rules | Policies | Flags | Compliance |
|---|---|---|---|---|---|
| 💼 4.1.1 Ensure that the cluster-admin role is only used where required (Automated) | no data | ||||
| 💼 4.1.2 Minimize access to secrets (Automated) | no data | ||||
| 💼 4.1.3 Minimize wildcard use in Roles and ClusterRoles (Automated) | no data | ||||
| 💼 4.1.4 Ensure that default service accounts are not actively used (Automated) | no data | ||||
| 💼 4.1.5 Ensure that Service Account Tokens are only mounted where necessary (Automated) | no data | ||||
| 💼 4.1.6 Avoid use of system:masters group (Automated) | no data | ||||
| 💼 4.1.7 Limit use of the Bind, Impersonate and Escalate permissions in the Kubernetes cluster (Manual) | no data | ||||
| 💼 4.1.8 Avoid bindings to system:anonymous (Automated) | no data | ||||
| 💼 4.1.9 Avoid non-default bindings to system:unauthenticated (Automated) | no data | ||||
| 💼 4.1.10 Avoid non-default bindings to system:authenticated (Automated) | no data |