Impact & Risk Analysis
- Severity: Critical
- CIS Benchmark: CIS 5.1.7
- Impact: Irrevocable Full Access. The
system:mastersgroup has unrestricted access to the Kubernetes API hard-coded into the API server source code. Unlike standard RBAC roles, permissions for this group cannot be reduced or revoked by modifying ClusterRoleBindings. If a user’s client certificate is issued with this group, they have permanent cluster-admin access until the certificate expires or the CA is rotated.
Common Misconfiguration
Issuing client certificates (e.g., for developers or CI/CD bots) that includeO=system:masters in the subject line. This is often done to quickly grant “super-user” access, but it bypasses the entire RBAC control plane.
Vulnerable Example
Secure Example
Audit Procedure
Review all credentials (users and service accounts) which have access to the cluster and ensure that the groupsystem:masters is not used.
Since this group is often set in Client Certificates, you must inspect the kubeconfig files or the PKI certificates issued:
- Fail:
Subject: ... O=system:masters - Pass:
Subject: ... O=system:nodesorO=my-group
Remediation
Remove thesystem:masters group from all users in the cluster.
- Revoke Certificates: If a user possesses a certificate with
O=system:masters, that certificate must be revoked (if using a CRL) or the cluster CA must be rotated to invalidate it. - Use RBAC: Instead of the magic group, bind the user to the
cluster-adminClusterRole using a standardClusterRoleBinding. This achieves the same level of access but remains manageable and revocable.

