Source | Azure Portal | ||||||||||||
Display name | Kubernetes clusters should minimize wildcard use in role and cluster role | ||||||||||||
Id | ca8d5704-aa2b-40cf-b110-dc19052825ad | ||||||||||||
Version | 1.1.0 Details on versioning |
||||||||||||
Versioning |
Versions supported for Versioning: 2 1.1.0 1.0.0 Built-in Versioning [Preview] |
||||||||||||
Category | Kubernetes Microsoft Learn |
||||||||||||
Description | Using wildcards '*' can be a security risk because it grants broad permissions that may not be necessary for a specific role. If a role has too many permissions, it could potentially be abused by an attacker or compromised user to gain unauthorized access to resources in the cluster. | ||||||||||||
Cloud environments | AzureCloud = true AzureUSGovernment = true AzureChinaCloud = unknown |
||||||||||||
Available in AzUSGov | The Policy is available in AzureUSGovernment cloud. Version: '1.0.0' Repository: Azure-Policy ca8d5704-aa2b-40cf-b110-dc19052825ad |
||||||||||||
Mode | Microsoft.Kubernetes.Data | ||||||||||||
Type | BuiltIn | ||||||||||||
Preview | False | ||||||||||||
Deprecated | False | ||||||||||||
Effect | Default Audit Allowed Audit, Disabled |
||||||||||||
RBAC role(s) | none | ||||||||||||
Rule aliases | none | ||||||||||||
Rule resource types | IF (1) |
||||||||||||
Compliance | Not a Compliance control | ||||||||||||
Initiatives usage |
|
||||||||||||
History |
|
||||||||||||
JSON compare |
compare mode:
version left:
version right:
|
||||||||||||
JSON |
|