Problem Statement
Which Kubernetes setting helps prevent cluster-wide escalation from a single namespace role?
Explanation
Prefer namespace-scoped permissions. ClusterRoleBinding grants rights across the cluster and can turn a small issue into full control.
Code Solution
SolutionRead Only
kubectl create role viewer --verb=get,list,watch --resource=pods -n dev kubectl create rolebinding viewer-bind --role=viewer --serviceaccount=dev:app -n dev
