
Summary
The 'Kubernetes Falco Shell Spawned' analytic monitors for the spawning of a shell in Kubernetes containers, utilizing Falco for runtime security. By intercepting system calls within the Kubernetes environment, the rule identifies potentially malicious activities indicative of unauthorized access. Such actions may lead to privilege escalation, arbitrary command execution, or manipulation of container processes, posing significant risks including data breaches, service interruptions, and threats to the overall security of Kubernetes infrastructure. Ensuring thorough audit logging and appropriate configuration in Kubernetes is essential for effective monitoring and response to these anomalies. Reference links provide additional guidance on audit logging policies and implementation strategies to enhance detection accuracy.
Categories
- Kubernetes
- Cloud
- On-Premise
Data Sources
- Kernel
- Container
- Kernel
ATT&CK Techniques
- T1204
Created: 2024-11-14