Ensure Azure AKS has RBAC (Role-based Access Control) enabled.
AKS (Azure Kubernetes Service) can be configured to use Azure AD (Active Directory) and Kubernetes RBAC (Role-based Access Control). RBAC is designed to work on resources within your AKS clusters. With RBAC, you can create a role definition that outlines the permissions to be applied. A user or group is then assigned this role definition for a particular scope, an individual resource, a resource group, or across the subscription.
We recommend you sign in to an AKS cluster using an Azure AD authentication token and configure Kubernetes RBAC. This will limit access to cluster resources based on a user's identity or group membership.
resource "azurerm_k8_cluster" "example" {
role_based_access_control {
enabled = false
}
}
resource "azure_k8_cluster" "example" {
role_based_access_control {
enabled = true
}
}