Admin access to default Service Account
In this next lab exercise, we'll grant cluster administrative privileges to a Service Account. This is not a best practice because may result in Pods using this Service Account being unintentionally launched with administrative permissions, allowing users that have exec
access to these Pods, to escalate and gain unrestricted access to the cluster.
To simulate this we'll need to bind the cluster-admin
Cluster Role the default
Service Account in the default
Namespace.
Within a few minutes you'll see the finding Policy:Kubernetes/AdminAccessToDefaultServiceAccount
in the GuardDuty Findings console. Take sometime to analyze the Finding details, Action, and Detective Investigation.
Delete the offending Role Binding by running the following command.