heroui logo

Google Cloud Kubernetes Secrets Modified or Deleted

Sigma Rules

View Source
Summary
This detection rule is designed to monitor for modifications or deletions of Kubernetes Secrets within Google Cloud Platform (GCP). Kubernetes Secrets are essentially sensitive information like passwords, OAuth tokens, and ssh keys, and their unauthorized alteration can lead to significant security breaches. The rule utilizes GCP audit logs to capture specific method calls related to Secrets (create, update, patch, delete) performed through the Kubernetes API. By triggering on these methods, the rule aims to alert administrators on potential credential access risks or misconfigurations within their Kubernetes environments. Users are advised to verify the identity and the legitimacy of the actions associated with these events, especially if they originate from unfamiliar sources. Regular review of GCP audit logs—especially focusing on user identity and behavior—can mitigate the risk of misusing privileged actions on Kubernetes Secrets.
Categories
  • Cloud
  • Kubernetes
  • Infrastructure
Data Sources
  • Cloud Service
  • Logon Session
Created: 2021-08-09