Security Rules
A comprehensive list of security rules for Kubernetes RBAC configurations. Each rule identifies potential security risks.
| Rule ID | Category | Name | Risk Level |
|---|---|---|---|
| 1000 | Elevation of Privilege | Cluster-wide pod exec | Critical |
| 1001 | Elevation of Privilege | Namespaced pod exec | High |
| 1002 | Elevation of Privilege | Cluster-wide pod attach | Critical |
| 1003 | Elevation of Privilege | Namespaced pod attach | High |
| 1004 | Information Disclosure | Cluster-wide pod port-forward | High |
| 1005 | Information Disclosure | Namespaced pod port-forward | Medium |
| 1006 | Elevation of Privilege | Create pods cluster-wide | Critical |
| 1007 | Elevation of Privilege | Create pods in a namespace | High |
| 1008 | Elevation of Privilege | Update/Patch pods cluster-wide | Critical |
| 1009 | Elevation of Privilege | Update/Patch pods in a namespace | High |
| 1010 | Information Disclosure | Read secrets cluster-wide | Critical |
| 1011 | Information Disclosure | Read secrets in a namespace | Critical |
| 1012 | Tampering | Modify secrets cluster-wide | Critical |
| 1013 | Tampering | Modify secrets in a namespace | Critical |
| 1014 | Elevation of Privilege | Node proxy access (Kubelet API) | Critical |
| 1015 | Elevation of Privilege | Modify node configuration (labels, taints) | Critical |
| 1016 | Denial of Service | Delete nodes | Critical |
| 1017 | Tampering | Manage PersistentVolumes (cluster-wide storage manipulation) | Critical |
| 1018 | Information Disclosure | Read pod logs cluster-wide | High |
| 1019 | Information Disclosure | Read pod logs in a namespace | Medium |
| 1020 | Elevation of Privilege | Manage ephemeral containers cluster-wide | Critical |
| 1021 | Elevation of Privilege | Manage ephemeral containers in a namespace | High |
| 1022 | Information Disclosure | Read ConfigMaps cluster-wide | High |
| 1023 | Information Disclosure | Read ConfigMaps in a namespace | Medium |
| 1024 | Tampering | Modify ConfigMaps cluster-wide | Critical |
| 1025 | Tampering | Modify ConfigMaps in a namespace | High |
| 1026 | Denial of Service | Delete namespaces | High |
| 1027 | Elevation of Privilege | Manage ClusterRoles (create, update, patch, delete) | Critical |
| 1028 | Elevation of Privilege | Manage ClusterRoleBindings (create, update, patch, delete) | Critical |
| 1029 | Elevation of Privilege | Manage Roles in a namespace (create, update, patch, delete) | High |
| 1030 | Elevation of Privilege | Manage RoleBindings in a namespace (create, update, patch, delete) | High |
| 1031 | Elevation of Privilege | Escalate privileges via ClusterRoles (escalate verb) | Critical |
| 1032 | Elevation of Privilege | Bind ClusterRoles to identities (bind verb) | Critical |
| 1033 | Elevation of Privilege | Manage Deployments cluster-wide (potential for privileged pod execution) | Critical |
| 1034 | Elevation of Privilege | Manage Deployments in a namespace (potential for privileged pod execution) | High |
| 1035 | Elevation of Privilege | Manage DaemonSets cluster-wide (runs on all nodes, high impact) | Critical |
| 1036 | Elevation of Privilege | Manage DaemonSets in a namespace (runs on nodes, high impact) | Critical |
| 1037 | Elevation of Privilege | Manage StatefulSets cluster-wide | Critical |
| 1038 | Elevation of Privilege | Manage StatefulSets in a namespace | High |
| 1039 | Elevation of Privilege | Manage CronJobs cluster-wide (scheduled privileged execution, persistence) | Critical |
| 1040 | Elevation of Privilege | Manage CronJobs in a namespace (scheduled privileged execution, persistence) | High |
| 1041 | Elevation of Privilege | Manage Jobs cluster-wide (one-off privileged execution) | Critical |
| 1042 | Elevation of Privilege | Manage Jobs in a namespace (one-off privileged execution) | High |
| 1043 | Tampering | Manage MutatingWebhookConfigurations | Critical |
| 1044 | Tampering | Manage ValidatingWebhookConfigurations | Critical |
| 1045 | Tampering | Manage CustomResourceDefinitions | Critical |
| 1046 | Tampering | Manage APIServices | Critical |
| 1047 | Spoofing | Create ServiceAccount Tokens | Critical |
| 1048 | Spoofing | Create ServiceAccount Tokens (ClusterRole for any SA in any namespace) | Critical |
| 1049 | Information Disclosure | Create TokenReviews (validate arbitrary tokens) | Medium |
| 1050 | Information Disclosure | Create SubjectAccessReviews (check arbitrary permissions) | Medium |
| 1051 | Information Disclosure | Create LocalSubjectAccessReviews (check permissions in a namespace) | Low |
| 1052 | Elevation of Privilege | Approve CertificateSigningRequests | Critical |
| 1053 | Spoofing | Create CertificateSigningRequests | Medium |
| 1054 | Information Disclosure | Manage (get, list, watch, delete) CertificateSigningRequests | Medium |
| 1055 | Elevation of Privilege | Manage CSIDrivers (potential node compromise) | Critical |
| 1056 | Tampering | Manage StorageClasses | High |
| 1057 | Denial of Service | Evict Pods cluster-wide | Medium |
| 1058 | Denial of Service | Evict Pods in a namespace | Medium |
| 1059 | Elevation of Privilege | Manage RuntimeClasses | Critical |
| 1060 | Elevation of Privilege | Wildcard permission on all resources cluster-wide (Cluster Admin) | Critical |
| 1061 | Elevation of Privilege | Wildcard permission on all resources in a namespace (Namespace Admin) | Critical |
| 1062 | Spoofing | Manage ClusterIssuers (cert-manager.io) | Critical |
| 1063 | Tampering | Manage ArgoCD Applications (argoproj.io) | Critical |
| 1064 | NetworkManipulation | Manage Cilium ClusterwideNetworkPolicies (cilium.io) | Critical |
| 1065 | Information Disclosure | Manage ETCDSnapshotFiles (k3s.cattle.io) | Critical |
| 1066 | Elevation of Privilege | Impersonate users, groups, or service accounts (cluster-wide) | Critical |
| 1067 | Elevation of Privilege | Manage ServiceAccounts cluster-wide | High |
| 1068 | Elevation of Privilege | Manage ServiceAccounts in a namespace | Medium |
| 1069 | Tampering | Patch node status cluster-wide | High |
| 1070 | Information Disclosure | Read events cluster-wide | Medium |
| 1071 | NetworkManipulation | Manage NetworkPolicies cluster-wide | Critical |
| 1072 | NetworkManipulation | Manage NetworkPolicies in a namespace | High |
| 1073 | NetworkManipulation | Manage Endpoints or EndpointSlices cluster-wide | Critical |
| 1074 | NetworkManipulation | Manage Endpoints or EndpointSlices in a namespace | High |
| 1075 | NetworkManipulation | Manage Services cluster-wide | Critical |
| 1076 | NetworkManipulation | Manage Services in a namespace | High |
| 1077 | Information Disclosure | Read RBAC configuration cluster-wide | Medium |
| 1078 | Elevation of Privilege | Use privileged PodSecurityPolicy (deprecated) | Critical |
| 1079 | Denial of Service | Manage PodDisruptionBudgets cluster-wide | Medium |
| 1080 | Tampering | Manage Leases cluster-wide | Critical |
| 1081 | Tampering | Manage Leases in kube-system or kube-node-lease namespace | Critical |
| 1082 | Information Disclosure | List Namespaces (Cluster Reconnaissance) | Low |
| 1083 | Information Disclosure | List ValidatingWebhookConfigurations (Reconnaissance) | Medium |
| 1084 | Information Disclosure | List MutatingWebhookConfigurations (Reconnaissance) | Medium |
| 1085 | Tampering | Create/Update ControllerRevisions (Potential Tampering) | Medium |
| 1086 | Information Disclosure | Create SelfSubjectRulesReviews (Discover Own Permissions) | Low |
| 1087 | Information Disclosure | Read LimitRanges (Namespace Information Disclosure) | Low |
| 1088 | Information Disclosure | Read ResourceQuotas (Namespace Information Disclosure) | Low |
| 1089 | Information Disclosure | Read All ResourceQuotas (Cluster-wide Information Disclosure) | Medium |
| 1090 | Tampering | Update CertificateSigningRequest Status (Tampering/DoS) | Medium |
| 1091 | NetworkManipulation | Manage Ingresses (Namespace Service Exposure/Traffic Redirection) | High |
| 1092 | NetworkManipulation | Manage IngressClasses (Cluster-wide Traffic Control Tampering) | Critical |
| 1093 | Tampering | Update NetworkPolicy Status (Cluster-wide Tampering) | Medium |
| 1094 | Tampering | Update PodDisruptionBudget Status (Namespace Tampering/DoS) | Medium |
| 1095 | Information Disclosure | Read ComponentStatuses (Control Plane Reconnaissance) | Medium |
| 1096 | Denial of Service | Update Deployment Scale (Resource Abuse/DoS) | High |
| 1097 | Denial of Service | Update StatefulSet Scale (Resource Abuse/DoS) | High |
| 1098 | Denial of Service | Manage FlowSchemas (API Server DoS/Manipulation) | Critical |
| 1099 | Denial of Service | Manage PriorityLevelConfigurations (API Server DoS/Manipulation) | Critical |
| 1100 | Information Disclosure | Read CSINode Objects (Node & Storage Reconnaissance) | Medium |
| 1101 | Information Disclosure | Read CSIStorageCapacities (Namespace Storage Reconnaissance) | Low |
| 1102 | Tampering | Manage VolumeAttachments (Cluster-wide Storage/Node Manipulation) | Critical |
| 1103 | Information Disclosure | Watch All Resources in a Namespace (Broad Information Disclosure) | High |