
Summary
This detection rule identifies the creation or modification of Kubernetes Rolebindings, which are critical components for managing access control in Kubernetes clusters. Rolebindings specify what actions a user or group can perform on specific resources within a namespace, thus making them a potential vector for privilege escalation attacks if altered maliciously. The rule utilizes Kubernetes audit logs to monitor for specific verbs including 'create', 'delete', 'patch', 'replace', and 'update' actions concerning Rolebindings and ClusterRolebindings under the 'rbac.authorization.k8s.io' API group. Given the significant security implications of unauthorized changes to Rolebindings, this rule is important for maintaining the integrity of user permissions in a Kubernetes environment. False positives may occur in scenarios where legitimate administrative actions or automated processes trigger the monitoring events.
Categories
- Kubernetes
- Cloud
- Infrastructure
Data Sources
- Kernel
- Application Log
- Script
Created: 2024-07-11