Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

detect anonymous permissions #19

Open
krol3 opened this issue Jul 3, 2023 · 3 comments
Open

detect anonymous permissions #19

krol3 opened this issue Jul 3, 2023 · 3 comments
Labels
enhancement New feature or request

Comments

@krol3
Copy link

krol3 commented Jul 3, 2023

Context

After creating a clusterrolebinding for the user system: anonymous, I didn't see it in the list of Risky report.

See the details :

kubectl create clusterrolebinding anonymous-xdemo --clusterrole=view --user=system: anonymous

@krol3 krol3 added the enhancement New feature or request label Jul 3, 2023
@welcome-to-palo-alto-networks
Copy link

🎉 Thanks for opening your first issue here! Welcome to the community!

@yuvalavra
Copy link
Contributor

I think it makes sense to add policies for the anonymous user & unauthenticated group.

Not sure on what to alert on though - do we flag any permission given to the anonymous user / grp? Should we have exceptions for harmless permissions that are commonly given to the them (given that’s actually a thing)? So a bit to sort out but I think that it’ll be a good addition.

I won’t get to implementing this soon so feel free to open a PR

@yuvalavra
Copy link
Contributor

yuvalavra commented Jul 12, 2023

Given it some thought and it’s a bit tricky to implement as rbac-police is built to alert on risky permissions rather than risky users & groups. Might still be doable though.

Btw it’s possible to run with ‘—violations user,group’ to search for users & groups with risky permissions, including the anonymous user / group

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

2 participants