The cluster was locked. Containers hummed in their pods, but no one could touch them without passing the gate. That gate is your Kubernetes access radius.
Kubernetes access radius defines the scope of control. It’s the zone from which an identity can act inside the cluster. Too wide, and risk spreads through every namespace. Too narrow, and developers are blocked, pipelines stall, deployments freeze. Precision here decides whether your system runs safely, or becomes attack surface.
Access radius starts at authentication. Every subject — human, service account, automation — must authenticate with the API server. Next comes authorization. Role-Based Access Control (RBAC) decides what verbs apply to which resources. Fine-grained roles reduce blast radius. Broad roles extend it across multiple clusters or environments. The access radius grows and shrinks with those definitions.
Network policies add another layer. By controlling ingress and egress for pods, you enforce boundaries that work alongside RBAC. They stop traffic at the packet level, even when credentials allow API actions. Properly set, they narrow the access radius to only trusted paths.