Kubectl sessions should not last longer than the time it takes to complete a task. Anything more is exposure you do not need. Zero standing privilege is the principle that no user, process, or service holds permanent access. Access is granted only when required, and revoked immediately after.
With kubectl, the risk is simple: a credential left valid in your environment can be used to deploy, delete, or modify cluster workloads at any time. Standing privileges invite both internal mistakes and external attacks. Zero standing privilege eliminates idle keys, tokens, and roles, locking the door the moment the work is done.
Implementing zero standing privilege for kubectl starts with short-lived credentials. This can be done by issuing temporary service accounts, ephemeral kubeconfigs, or token-based auth with automatic expiry. Audit your clusters for unused accounts. Close them. Integrate with identity providers that support just-in-time role assumption. Make the default state “no access” and require deliberate actuation to get it.