From 54e1d3308ea1e5db1954365d1dd1e51d5da5bb66 Mon Sep 17 00:00:00 2001 From: Tim Bannister Date: Wed, 27 Mar 2024 16:36:16 +0000 Subject: [PATCH] Align with style guide --- content/en/docs/concepts/security/rbac-good-practices.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/content/en/docs/concepts/security/rbac-good-practices.md b/content/en/docs/concepts/security/rbac-good-practices.md index e8fb42a724..f935061674 100644 --- a/content/en/docs/concepts/security/rbac-good-practices.md +++ b/content/en/docs/concepts/security/rbac-good-practices.md @@ -183,7 +183,7 @@ mutating webhooks, also mutate admitted objects. ### Namespace modification -Users who can perform `patch` operations on `namespace` objects through a namespaced rolebinding can modify +Users who can perform **patch** operations on Namespace objects (through a namespaced RoleBinding to a Role with that access) can modify labels on that namespace. In clusters where Pod Security Admission is used, this may allow a user to configure the namespace for a more permissive policy than intended by the administrators. For clusters where NetworkPolicy is used, users may be set labels that indirectly allow