
Summary
This rule identifies when a service account namespace file is accessed during the operation of a container in a Kubernetes environment. The namespace file, located at /var/run/secrets/kubernetes.io/serviceaccount/namespace, is critical for delineating the permissions and capabilities within a Kubernetes pod. An adversary reading this file can use the information to inform their next steps, such as scoping out resources or exploiting vulnerabilities within that namespace. A common adversarial technique is to first acquire a shell within a pod and then read this file to personalize their attack strategy, leveraging insights into the pod's structure, services, and permissions for lateral movement. The rule triggers when there is an interactive process (e.g., a shell) inside the container that attempts to read this file, indicating potential reconnaissance or unauthorized actions.
Categories
- Kubernetes
- Containers
- Cloud
- Linux
Data Sources
- Container
ATT&CK Techniques
- T1613
- T1082
Created: 2026-01-21