heroui logo

Kubernetes Privileged Pod Created

Elastic Detection Rules

View Source
Summary
The 'Kubernetes Privileged Pod Created' detection rule identifies instances when a user creates a pod or container in privileged mode, which can potentially expose the host's resources and break container isolation. Privileged containers allow access similar to that of processes running directly on the host, posing significant security risks if compromised by adversaries. This rule monitors Kubernetes audit logs to flag events where a pod is created with privileged access settings while excluding known safe images. False positives may arise from legitimate use cases such as safe images, commonly used in development or testing environments. As a response to detection, relevant investigation steps include reviewing the audit logs for the creating user or service account, assessing the image used, and consulting with associated teams to evaluate the necessity of such pod creation. Immediate remediation steps involve isolating the node, terminating the privileged pod, and conducting thorough audits on affected resources. This rule is essential for maintaining Kubernetes security and preventing privilege escalation and unauthorized access within the environment.
Categories
  • Kubernetes
  • Cloud
  • Infrastructure
Data Sources
  • Pod
  • Container
  • Kernel
ATT&CK Techniques
  • T1611
  • T1610
Created: 2022-07-05