Back to controls

Enable Role-Based Access Control (RBAC) within Azure Kubernetes Services

Ensure that RBAC is enabled on all Azure Kubernetes Services Instances.

Category

Controls

Low

Applies to

Microsoft Azure

Coverage

1 queries

Asset types

1 covered

Overview

Ensure that RBAC is enabled on all Azure Kubernetes Services Instances.

Rationale

Azure Kubernetes Services has the capability to integrate Azure Active Directory users and groups into Kubernetes RBAC controls within the AKS Kubernetes API Server. This should be utilized to enable granular access to Kubernetes resources within the AKS clusters supporting RBAC controls not just of the overarching AKS instance but also of the individual resources managed within Kubernetes.

Impact

If RBAC is not enabled, the granularity of permissions granted to Kubernetes resources is diminished, presenting more permissions than needed to users requiring access to Kubernetes resources in AKS.

Remediation guidance

WARNING: This setting cannot be changed after AKS deployment, cluster will require recreation.

Default Value

By default, RBAC is enabled.

References

  1. https://learn.microsoft.com/en-us/azure/aks/aad-integrationhttps://kubernetes.io/docs/reference/access-authn-authz/rbac/https://learn.microsoft.com/en-us/cli/azure/aks?view=azure-cli-latest#az-aks-list
  2. https://learn.microsoft.com/en-us/azure/security/benchmarks/security-controls-v2-privileged-access#pa-7-follow-just-enough-administration-least-privilege-principle

Azure Portal (Asset-Level)

  1. Open the affected resource from the finding details in Azure Portal.
  2. Navigate to the relevant Security/Configuration/Networking blade.
  3. Apply the control-specific secure setting.
  4. Save and re-run the check.

Service-wide remediation

Recommended when many resources are affected: fix the platform baseline first so new resources inherit the secure setting, then remediate the existing flagged resources in batches.

Azure

Use management group or subscription Azure Policy assignments, remediation tasks where supported, landing-zone standards, and IaC modules so drift is prevented at scale.

Operational rollout

  1. Fix the baseline first at the account, subscription, project, cluster, or tenant scope that owns this control.
  2. Remediate the currently affected resources in batches, starting with internet-exposed and production assets.
  3. Re-scan and track approved exceptions with an owner and expiry date.

Query logic

These are the stored checks tied to this control.

Enable role-based access control (RBAC) within Azure Kubernetes Services

Connectors

Microsoft Azure

Covered asset types

Cluster

Expected check: eq []

{aksClusters(where:{enableRBAC_NOT:true}){...AssetFragment}}
Cyscale Logo
Cyscale is an agentless cloud-native application protection platform (CNAPP) that automates the contextual analysis of cloud misconfigurations, vulnerabilities, access, and data, to provide an accurate and actionable assessment of risk.

Stay connected

Receive new blog posts and product updates from Cyscale

By clicking Subscribe, I agree to Cyscale’s Privacy Policy


© 2026 Cyscale Limited

LinkedIn icon
Twitter icon
Facebook icon
crunch base icon
angel icon