Snyk - Open Source Security
Log In
Sign Up
Ecosystem
AWS
API Gateway (REST APIs)
Athena
Batch
CloudFront
CloudTrail
CloudWatch
CodeBuild
Cognito
Config
DocumentDB
DynamoDB
EBS
EC2
ECR
ECS
EFS
EKS
ElastiCache
Elastic Load Balancing
Elastic Map Reduce (EMR)
ElasticSearch
Glacier
Global Accelerator
Glue
IAM
KMS
Kinesis
Lambda
MQ
Managed Streaming for Kafka (MSK)
Neptune
Provider
Public Access
Quantum Ledger Database
RDS
Redshift
S3
SNS
SQS
SSM
Sagemaker
Secrets Manager
Transfer
VPC
WorkSpace
Azure
API Management
App Service (Web Apps)
Authorization
Automation
Batch
CDN
Compute
Container
CosmosDB (DocumentDB)
Data Factory
Data Lake
Database
Key Vault
Monitor
Network
Redis
Search
Security Center
Service Fabric
Storage
Synapse
GCP
App Engine
BigQuery
Cloud DNS
Cloud Key Management Service
Cloud Platform
Cloud SQL
Cloud Storage
Compute Engine
IAM
Kubernetes (Container) Engine
MemoryStore (Redis)
Kubernetes
Deployment
Network Policy
Pod Security Policy
Role
RoleBinding
Service
Tags
CloudFormation
Terraform
ARM
Kubernetes
Home
>
Kubernetes
>
RoleBinding
>
Role with dangerous permissions
medium severity
Role with dangerous permissions
(SNYK-CC-K8S-47)
Kubernetes
RoleBinding
Terraform
Issue
A role was found using a dangerous permissions
Impact
Using this role grants dangerous permissions
Resolve
Kubernetes
Consider removing this permissions
Terraform
Consider removing this permissions
References
https://kubernetes.io/docs/reference/access-authn-authz/rbac/
CIS Kubernetes Benchmark 1.7.0 - 5.1.2 Minimize access to secrets.
CIS Kubernetes Benchmark 1.7.0 - 5.1.4 Minimize access to create pods.