You log in, and K9S loads. Every pod, every namespace, every secret—right there. Too much access. Too much risk.
K9S is powerful. It’s a real-time CLI dashboard for Kubernetes. But by default, many teams hand it over with overly broad RBAC roles. In complex clusters, this breaks the principle of least privilege and opens the door to accidental changes, data exposure, and lateral movement after compromise.
Least privilege in K9S means every user gets only the permissions they need, nothing more. It is not enough to trust engineers to “just be careful.” Kubernetes security must be enforced at the role level. Start with ServiceAccounts mapped to narrow Roles or ClusterRoles. Bind them with exact verbs—get, list, watch—instead of create, delete, or patch unless required. Scope access to specific namespaces. Verify that secrets, ConfigMaps, and sensitive workloads are out of reach for non-admin users.