All technologies
RBAC
2 painsavg 8.5/10
security 1config 1
Insecure default configurations enabling privilege escalation
9Deploying containers with insecure settings (root user, 'latest' image tags, disabled security contexts, overly broad RBAC roles) persists because Kubernetes doesn't enforce strict security defaults. This exposes clusters to container escape, privilege escalation, and unauthorized production changes.
securityKubernetesRBAC
Complex surrounding infrastructure requiring deep expertise
8The real challenge in Kubernetes deployment goes beyond cluster setup to configuring RBAC, secrets management, and infrastructure-as-code. Teams without prior experience make decisions that require painful redesigns later, as shown by organizations requiring 50% of their year dedicated to cluster maintenance.
configKubernetesRBACIaC