heroui logo

Kubernetes Anonymous Request Authorized

Elastic Detection Rules

View Source
Summary
The "Kubernetes Anonymous Request Authorized" rule is designed to detect unauthorized access attempts through anonymous user requests in Kubernetes clusters. Attackers may exploit the ability to make unauthenticated requests to perform actions that compromise the integrity of the cluster without attribution. This rule specifically monitors audit logs for requests from the `system:anonymous` or `system:unauthenticated` users, while excluding common health-check endpoints (/healthz, /livez, and /readyz) to reduce false positives. It seeks to identify instances where anonymous access leads to authorized actions being logged, thus flagging potential misuse. If the rule triggers, it suggests a thorough investigation is warranted, focusing on the specific context of the request, source metadata, and any subsequent activities that may indicate exploitation of vulnerabilities in the cluster. The setup requirements involve the Kubernetes Fleet integration with Audit Logs to ensure accuracy and effectiveness.
Categories
  • Kubernetes
  • Cloud
Data Sources
  • Kernel
  • Process
  • Application Log
  • Network Traffic
ATT&CK Techniques
  • T1078
  • T1078.001
Created: 2022-09-13