The cluster was wide open, and anyone with a kubeconfig could do anything. This is where Kubernetes RBAC guardrails, SSH access controls, and proxy layers become the difference between controlled order and chaos.
Kubernetes RBAC (Role-Based Access Control) defines who can do what in your cluster. Without strict guardrails, misconfigured roles can grant broad privileges. Applied correctly, RBAC guardrails restrict actions to exactly what is required—no more, no less. They enforce principle of least privilege at scale, cutting off dangerous paths before they are taken.
SSH access into nodes is another point of exposure. Direct access bypasses API protections and RBAC entirely. This is why teams deploy an SSH access proxy. A proxy centralizes authentication, logs every command, and filters sessions based on RBAC-linked permissions. Instead of trusting individual keys scattered across developers’ laptops, the proxy becomes the controlled gate in front of your infrastructure.