Beike Product & Technology
Jan 12, 2024 · Information Security
Understanding High‑Risk Kubernetes RBAC Permissions and a Graph‑Based Risk Identification System
This article examines how misconfigured Kubernetes RBAC permissions can lead to privilege escalation across clusters, presents a graph‑based model to represent users, roles, and authorities, and provides code examples and Cypher queries for detecting and visualizing high‑risk permission paths.
KubernetesRBACSecurity
0 likes · 16 min read