Skip to content
NEW

Security news and analysis brought to you by the McCrary Institute

READ MORE

Kubernetes pods are inheriting too many permissions

(Image by johndavi from Pixabay)

By Becky Bracken

It’s likely that open source container Kubernetes misconfigurations and application exploits are unnecessarily exposing many organizations’ clouds to privilege escalation — an issue that could lead to entire clusters’ persistent compromise. But research from the SANS Institute shows that securing Kubernetes by adopting workload identity is a no-cost, scalable way for teams to mitigate this risk.

By default, Kubernetes pods inherit the same permissions as the node because it makes it easier to deploy at scale. But they are far too easy to compromise by attackers armed with stolen credentials. With those escalated, node-level pod privileges in their back pocket, threat actors don’t even have to break a sweat making the lateral move into the whole cluster.

Read more at Dark Reading