Intelligence Section 05.C
Kubernetes Findings
Container orchestration and RBAC mesh analysis for the AiVRIC AKS Fleet.
ID: aivric-aks-cluster
87.4% Pass Rate
Postures vs Failures
High Risk Gaps
306
100% of failed findings are categorized as HIGH risk, primarily driven by systemic RBAC wildcard permissions across the cluster fabric.
RBAC Intensity Map
Systemic RBAC Over-Privilege
Tactical Risk Analysis
Check rbac_minimize_wildcard_use_roles failed across 306 distinct resource instances. ClusterRoles and Roles are using wildcard (*) permissions for resources and verbs, bypassing least-privilege protocols. This enables potential pod-to-cluster lateral movement and unrestricted secret access if a workload is compromised.
Topological Risk Registry
High-Impact ClusterRoles Isolation