Month End Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Linux Foundation Certified Kubernetes Security Specialist (CKS) CKS Question # 13 Topic 2 Discussion

Linux Foundation Certified Kubernetes Security Specialist (CKS) CKS Question # 13 Topic 2 Discussion

CKS Exam Topic 2 Question 13 Discussion:
Question #: 13
Topic #: 2

CKS Question 13

Context

A Role bound to a Pod's ServiceAccount grants overly permissive permissions. Complete the following tasks to reduce the set of permissions.

Task

Given an existing Pod named web-pod running in the namespace security.

Edit the existing Role bound to the Pod's ServiceAccount sa-dev-1 to only allow performing watch operations, only on resources of type services.

Create a new Role named role-2 in the namespace security, which only allows performing update

operations, only on resources of type namespaces.

Create a new RoleBinding named role-2-binding binding the newly created Role to the Pod's ServiceAccount.

CKS Question 13


Get Premium CKS Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.