heroui logo

Kubernetes Secrets Modified or Deleted

Sigma Rules

View Source
Summary
This detection rule monitors changes to Kubernetes Secrets, specifically focusing on events that involve modification or deletion actions. It triggers on audit logs when there are 'create', 'delete', 'patch', 'replace', or 'update' verbs applied to resources of type 'secrets'. Since Kubernetes Secrets are crucial for managing sensitive data like passwords, tokens, or keys, unauthorized changes to these can lead to severe security incidents. The rule aims to strengthen the security posture of Kubernetes environments by providing visibility into potentially harmful operations performed on secrets, after which appropriate investigations or mitigations can be imposed.
Categories
  • Kubernetes
  • Cloud
  • Containers
Data Sources
  • Kernel
  • Kernel
  • Cloud Service
Created: 2024-07-11