heroui logo

Container Management Utility Run Inside A Container

Elastic Detection Rules

View Source
Summary
This detection rule identifies instances where container management binaries are executed from within a container. Such behavior can signify unauthorized access or misconfigurations, which are crucial in maintaining the integrity of container environments. The rule specifically looks for process events initiating from a Linux host, filtering for notable binaries associated with container management like 'dockerd', 'docker', and 'kubectl'. When a process meeting the criteria runs, it raises an alert with a risk score of 21, providing a basis for further investigation. Given the possibility of false positives—especially if legitimate administrative tasks are involved—thorough analysis and context gathering around the alerts are recommended. The setup requires integration with Elastic Defend to oversee the necessary data flow and event monitoring.
Categories
  • Containers
  • Linux
  • Cloud
Data Sources
  • Container
  • Application Log
  • Process
ATT&CK Techniques
  • T1609
Created: 2025-03-12