| Source | Azure Portal | ||||||||||||
| Display name | Kubernetes clusters should minimize wildcard use in role and cluster role | ||||||||||||
| Id | ca8d5704-aa2b-40cf-b110-dc19052825ad | ||||||||||||
| Version | 1.1.0 Details on versioning | ||||||||||||
| Versioning | Versions supported for Versioning: 2 1.1.0 1.0.0 Built-in Versioning [Preview] | ||||||||||||
| Category | Kubernetes Microsoft Learn | ||||||||||||
| Description | Using wildcards '*' can be a security risk because it grants broad permissions that may not be necessary for a specific role. If a role has too many permissions, it could potentially be abused by an attacker or compromised user to gain unauthorized access to resources in the cluster. | ||||||||||||
| Cloud environments | AzureCloud = true AzureUSGovernment = true AzureChinaCloud = unknown | ||||||||||||
| Available in AzUSGov | The Policy is available in AzureUSGovernment cloud. Version: '1.0.0' Repository: Azure-Policy ca8d5704-aa2b-40cf-b110-dc19052825ad | ||||||||||||
| Mode | Microsoft.Kubernetes.Data | ||||||||||||
| Type | BuiltIn | ||||||||||||
| Preview | False | ||||||||||||
| Deprecated | False | ||||||||||||
| Effect | Default Audit Allowed Audit, Disabled | ||||||||||||
| RBAC role(s) | none | ||||||||||||
| Rule aliases | none | ||||||||||||
| Rule resource types | IF (1) | ||||||||||||
| Compliance | Not a Compliance control | ||||||||||||
| Initiatives usage | 
 | ||||||||||||
| History | 
 | ||||||||||||
| JSON compare | 
                compare mode:
            
                version left:
            
                version right:
            
                
                
                    
                    
                 | ||||||||||||
| JSON | 
 |