Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 597

Kubernetes Admission Controller

What is Kubernetes Admission Controller?

Kubernetes Admission ControllerAn admission controller is a Kubernetes API server plugin that intercepts authenticated requests before persistence to validate, mutate, or reject objects against policy.


Kubernetes admission runs in two phases: mutating controllers can alter the object (set defaults, inject sidecars) and validating controllers can accept or reject it. Built-in controllers include NamespaceLifecycle, ResourceQuota, ServiceAccount, Pod Security, and ImagePolicyWebhook. External controllers register as MutatingWebhookConfiguration or ValidatingWebhookConfiguration, receive AdmissionReview JSON, and return a verdict; ValidatingAdmissionPolicy (1.28+) embeds CEL rules directly in the API. Admission is the primary enforcement point for security policy in Kubernetes (Pod Security Standards, image-signing requirements, label hygiene), and it is where OPA Gatekeeper and Kyverno hook in. Webhook failures can break the cluster, so failurePolicy and timeouts must be tuned carefully.

Examples

  1. 01

    A mutating webhook injecting an Istio sidecar into every new pod in a labelled namespace.

  2. 02

    A ValidatingAdmissionPolicy that rejects Deployments without a runAsNonRoot setting.

Frequently asked questions

What is Kubernetes Admission Controller?

An admission controller is a Kubernetes API server plugin that intercepts authenticated requests before persistence to validate, mutate, or reject objects against policy. It belongs to the Cloud Security category of cybersecurity.

What does Kubernetes Admission Controller mean?

An admission controller is a Kubernetes API server plugin that intercepts authenticated requests before persistence to validate, mutate, or reject objects against policy.

How does Kubernetes Admission Controller work?

Kubernetes admission runs in two phases: mutating controllers can alter the object (set defaults, inject sidecars) and validating controllers can accept or reject it. Built-in controllers include NamespaceLifecycle, ResourceQuota, ServiceAccount, Pod Security, and ImagePolicyWebhook. External controllers register as MutatingWebhookConfiguration or ValidatingWebhookConfiguration, receive AdmissionReview JSON, and return a verdict; ValidatingAdmissionPolicy (1.28+) embeds CEL rules directly in the API. Admission is the primary enforcement point for security policy in Kubernetes (Pod Security Standards, image-signing requirements, label hygiene), and it is where OPA Gatekeeper and Kyverno hook in. Webhook failures can break the cluster, so failurePolicy and timeouts must be tuned carefully.

How do you defend against Kubernetes Admission Controller?

Defences for Kubernetes Admission Controller typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for Kubernetes Admission Controller?

Common alternative names include: Admission webhook, ValidatingAdmissionPolicy.

Related terms