Kubernetes Role-Based Access Control defines who can do what, where, and when inside a cluster. Without strong guardrails, developers and operators can escalate privileges, read sensitive configs, or delete critical workloads. These aren’t edge cases. They happen when RBAC policies drift from intent.
Procurement tickets tell another story. A simple request for resources—compute, storage, tooling—often requires RBAC changes. But if guardrails are lax, a ticket can lead to privilege inflation. One wrong binding in ClusterRole or RoleBinding and a temporary grant becomes a permanent vulnerability.
A secure process demands automation. Every RBAC change triggered by a procurement ticket should pass through policy validation. This means defining constraints for namespaces, verbs, and API groups before the change hits the cluster. Enforcement happens at change-time, not weeks later during audit.