
Environment Variable Enumeration Detected via Defend for Containers
Elastic Detection Rules
View SourceSummary
This rule detects the execution of the 'env' and 'printenv' commands within Linux containers, which are commonly used to display environment variables. The ability to list these variables can provide attackers with critical information such as credentials and configuration settings. The detection mechanism relies on monitoring process executions that match these command names within the container context. False positives may occur during legitimate debugging or troubleshooting sessions where administrators may run these commands. The rule includes detailed steps for investigation and response, emphasizing the need to correlate with Kubernetes audit logs, review pod context, and implement remediation tactics upon detection.
Categories
- Containers
- Linux
- Cloud
- Infrastructure
Data Sources
- Container
- Process
- Network Traffic
ATT&CK Techniques
- T1613
- T1082
Created: 2026-01-21