That’s how most people discover they’ve given too much power to the wrong hands. Kubectl is a sharp tool. Without restricted access, it can slice through entire systems in seconds. One wrong command, one bored junior engineer, one compromised key—and your cluster is wide open.
Kubectl restricted access isn't a nice-to-have. It’s the line between control and chaos. Kubernetes RBAC (Role-Based Access Control) exists for a reason. Lock down each verb, each namespace, each resource. Don’t rely on trust alone.
Audit your kubeconfig files. Rotate credentials. Stop handing out admin-level context like candy. Split responsibilities. Define roles with the minimum privileges needed. Bind roles to specific service accounts. Use namespaces to isolate workloads. Never allow wildcard * permissions. Close unauthenticated API access before someone else does.