The pod failed. Not because of code, but because the wrong service account had too much power.
Kubernetes RBAC guardrails exist to stop that. They define what users, pods, and controllers can do. Without them, a compromised container can escape its namespace and impact the cluster. With them, roles and bindings keep workloads in check.
RBAC in Kubernetes is built on roles and cluster roles. Roles define permissions within a namespace. Cluster roles apply across the entire cluster. Service accounts are the identities pods use to talk to the API server. Bindings connect accounts to roles. If you bind a service account to a cluster-admin role, it can do almost anything—create pods, delete deployments, reconfigure the cluster. This is why RBAC guardrails matter.
Strong guardrails start with clear isolation. Assign only the permissions a workload needs. Use Role instead of ClusterRole whenever possible. Audit RoleBinding and ClusterRoleBinding regularly. Rotate and revoke service account tokens that are no longer needed.