heroui logo

GCP K8S Privileged Pod Created

Panther Rules

View Source
Summary
This detection rule monitors the creation of privileged Kubernetes pods in a Google Cloud Platform (GCP) environment. Privileged pods can access the host’s namespace and devices, potentially allowing an attacker to exploit the kernel or gain elevated privileges within the container's execution context. The security concern arises if a privileged pod escapes its container, allowing an attacker to operate with root privileges on the GCP node. Such adversarial behavior can lead to further lateral movement or compromise sensitive data within the node. Therefore, this rule serves as a precautionary measure against the deployment of potentially dangerous workloads that can increase the attack surface significantly. The rule is designed to trigger alerts whenever a user attempts to create a privileged pod, prompting an investigation to understand the necessity of this action. The rule is especially pertinent given that the security best practice discourages the use of privileged pods unless absolutely necessary, making it critical for security teams to assess the implications of any such deployments.
Categories
  • Cloud
  • Kubernetes
  • Infrastructure
Data Sources
  • Pod
  • Group
  • Cloud Service
ATT&CK Techniques
  • T1548
Created: 2024-02-13