heroui logo

Kubernetes Azure detect service accounts forbidden failure access

Splunk Security Content

View Source
Summary
This rule is designed to identify instances where Kubernetes service accounts are attempting to access resources but receive a forbidden response. The rule leverages data from Kubernetes audit logs to parse events where service accounts belong to 'system:serviceaccounts' group but are denied access (i.e., have a response status of 'Forbidden'). The output table contains vital information such as source IPs, user details, the HTTP verb used, and the reason behind the denied response. Given that the search is categorized under kube-audit, it specifically targets Azure Kubernetes Service (AKS) clusters to monitor sensitive operations, which is critical for defending against unauthorized access and ensuring proper permissions are enforced within the cluster. However, it should be noted that this detection may yield false positives due to underlying authentication issues or misconfigured permissions within the Kubernetes cluster.
Categories
  • Kubernetes
  • Azure
  • Cloud
Data Sources
  • Kernel
  • Application Log
  • Network Traffic
Created: 2024-11-14