SPIKE - Audit RBAC permissions on a default deployment of Big Bang
RBAC permissions need to be audited for least-privileges. Any service accounts given "*" privileges or create privileges for pods (incl. daemonsets, jobs, replicasets, statefulsets, deployments, etc.) should be scrutinized and permissions reduced if possible.
This spike would use the a tool from RBAC.dev to analyze BigBang's RBAC configuration. KubiScan looks like it might actually flag risky permissions. Issues should be opened up under packages for any permissions that are deemed to be too permissive.