Governance & Power
RBAC and the Governance of Power
RBAC is the cluster’s constitution. Poorly written, it becomes silent catastrophe during incident response.
Text
Authored as doctrine; evaluated as operations.
Doctrine
Authority is the highest-risk asset in a Kubernetes platform. RBAC is how you define, review, and constrain that authority.
Kubblai doctrine is strict: every privilege must have an owner and a reason.
Least privilege in the real world
Least privilege is not achieved by denying everything. It is achieved by understanding workflows and encoding only what is required—then iterating when reality changes.
A rigid RBAC posture that blocks operations will be bypassed. Bypass is worse than permission.
Break-glass access as an institution
Incidents require elevated access. If you do not design for it, engineers will create ad-hoc privilege in the worst moment.
Break-glass should be time-bound, audited, and rare.
Concrete example
A minimal read-only role for pods in a namespace.
Role + RoleBinding (read pods)
yaml
apiVersion: rbac.authorization.k8s.io/v1
kind: Role
metadata:
name: pod-reader
rules:
- apiGroups: [""]
resources: ["pods", "pods/log", "events"]
verbs: ["get", "list", "watch"]
---
apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata:
name: pod-reader-binding
subjects:
- kind: ServiceAccount
name: reader
roleRef:
kind: Role
name: pod-reader
apiGroup: rbac.authorization.k8s.ioReview discipline
RBAC is code. Review it. Test it. Audit it. Treat accidental privilege escalation as a platform defect, not as a user mistake.
Institutional power should be visible.
Canonical Link
Canonical URL: /library/rbac-and-the-governance-of-power
Related Readings
Governance & Power
LibraryService Accounts and Delegated Identity
Identity is how the cluster knows who is acting. Delegation is how it limits what they can do.
Governance & Power
LibraryPolicy as Doctrine, Not Suggestion
Policy is what makes a platform institutional. Without it, every incident is negotiated from scratch.
Governance & Power
LibraryPod Security Admission and the Hierarchy of Trust
Pod security is a boundary between ‘works’ and ‘safe to run.’ The hierarchy of trust must be explicit and enforced.
Dark Council
LibraryThe Criteria for Invitation to the Dark Council
The Dark Council is not a costume. It is a governing body defined by proof: the ability to keep platforms stable and policy coherent at scale.
Governance & Power
LibraryThe Covenant of Cluster Stewards
Stewardship is a commitment to make systems legible and survivable. The covenant is the operator’s constitution.