More Info:

Ensure that RBAC is enabled on all Azure Kubernetes Services Instances

Risk Level

Medium

Address

Security

Compliance Standards

CISAZURE, CBP, HITRUST, SOC2

Triage and Remediation

Remediation

To remediate the misconfiguration of enabling Role-Based Access Control (RBAC) within Azure Kubernetes Services, you can follow the below steps using the Azure console:

  1. Open the Azure Portal and navigate to the Azure Kubernetes Service (AKS) cluster that needs to be remediated.

  2. Click on the “Access Control (IAM)” option from the left-hand menu.

  3. Click on the “Add” button and select “Add role assignment” from the dropdown menu.

  4. In the “Add role assignment” blade, select the desired role from the “Role” dropdown menu. For example, “Owner”, “Contributor” or “Reader”.

  5. In the “Select” box, search for the user or group that needs to be assigned the role.

  6. Click on the “Save” button to assign the role to the selected user or group.

  7. Repeat steps 4 to 6 to assign roles to other users or groups as needed.

  8. Once all the roles have been assigned, click on the “Save” button to save the changes.

By following these steps, you will be able to enable Role-Based Access Control (RBAC) within Azure Kubernetes Services and remediate the misconfiguration.

Additional Reading: