A Comparative Study of Authorization Mechanisms in Kubernetes-Based Service Platforms
More details
Hide details
1
Dipartimento di Automatica e Informatica (DAUIN), Politecnico di Torino, Italy
These authors had equal contribution to this work
Submission date: 2026-02-23
Final revision date: 2026-04-02
Acceptance date: 2026-04-09
Publication date: 2026-05-21
Corresponding author
Daniele Bringhenti
Dipartimento di Automatica e Informatica (DAUIN), Politecnico di Torino, Italy
Applied Cybersecurity & Internet Governance 2025;4(Special Issue - guest editor prof. Joanna Kołodziej 2)
KEYWORDS
TOPICS
ABSTRACT
Kubernetes has become a core substrate for digital service platforms, where multiple teams, tenants, and automation components share the same control plane. In this setting, authorization is a central security control because it governs API operations that can expose sensitive data, change runtime behavior, or disrupt availability. Enforcing least privilege in Kubernetes is challenging in practice: the authorization surface is broad, policies evolve continuously, and automation identities frequently act with privileges that can amplify the impact of misconfiguration or compromise. This paper compares Kubernetes authorization mechanisms, covering native options (RBAC, ABAC, and Authorization Webhooks) together with representative open-source approaches that enable more expressive models, namely Open Policy Agent (OPA) and SpiceDB. The analysis is grounded in operational requirements typical of shared clusters, including delegated administration, constrained access to sensitive resources, least-privilege automation, and controlled administrative operations. Mechanisms are evaluated through a unified framework that captures both security and operational consequences along four dimensions: complexity, granularity, scalability, and performance. The results show that no mechanism dominates across all dimensions. RBAC remains an effective baseline due to tight integration and low-latency enforcement, but it can be difficult to extend to contextual constraints without policy sprawl. ABAC supports conditional rules but is often penalized by operational workflows that make policy evolution costly. Webhook authorization is flexible but introduces a security-critical external dependency on the API request path. More expressive approaches such as OPA and SpiceDB are justified when they replace brittle approximations and support disciplined policy lifecycle management or relationship-driven permissions at scale.