heroui logo

Kubernetes User Exec into Pod

Elastic Detection Rules

View Source
Summary
The rule 'Kubernetes User Exec into Pod' detects user attempts to establish shell sessions in Kubernetes pods through the 'exec' command. The 'exec' command allows users to execute arbitrary commands within a pod, which may enable adversaries to gain unauthorized access to sensitive data and resources. This rule monitors Kubernetes audit logs for specific patterns, such as allowed 'exec' actions on pods, which could indicate malicious activity. False positives may arise from legitimate administrative tasks, scripts, and environment-specific operations. A structured investigation approach is suggested to discern between normal operational activity and actual threats, focusing on user activity, audit logs, and the context of pod access. The rule applies a risk score of 47 and operates under the 'medium' severity level.
Categories
  • Kubernetes
  • Cloud
  • Infrastructure
Data Sources
  • Kernel
  • Pod
  • Container
  • Application Log
ATT&CK Techniques
  • T1609
Created: 2022-05-17