5.1.13 Minimize access to the service account token creation

Information

Users with rights to create new service account tokens at a cluster level, can create long-lived privileged credentials in the cluster. This could allow for privilege escalation and persistent access to the cluster, even if the users account has been revoked.

Rationale:

The ability to create service account tokens should be limited.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

Where possible, remove access to the token sub-resource of serviceaccount objects.

See Also

https://workbench.cisecurity.org/benchmarks/12958