Check provider logo

AKS cluster has RBAC enabled

aks_cluster_rbac_enabled

Severityhigh
Serviceaks
by Prowler

AKS clusters with Kubernetes RBAC enforce authorization through roles and bindings mapped to identities and groups.

This evaluates whether the cluster has RBAC enabled to control access to namespaces and cluster-wide resources.

Risk

Without Kubernetes RBAC, authorization becomes overly broad, weakening least privilege. Compromised credentials could read secrets, alter workloads, or delete services, impacting confidentiality, integrity, and availability, and enabling lateral movement across the cluster.

Run this check with Prowler CLI

prowler azure --checks aks_cluster_rbac_enabled

Recommendation

Enable Kubernetes RBAC and design permissions with least privilege: scope roles to namespaces, grant access via groups, apply deny-by-default, and separate duties for admins and operators.

Integrate with Microsoft Entra ID and review/audit role bindings to maintain defense in depth.

Remediation

Native IaC
Terraform
Other
  1. In Azure portal, go to Kubernetes services > Create (or edit your deployment template)
  2. On the Authentication tab, set Kubernetes RBAC to Enabled
  3. Review + Create to deploy (re-create the cluster if the setting can't be changed on an existing one)

Source Code

Resource Type

microsoft.containerservice/managedclusters

References