
Summary
The 'GCP K8s IOCActivity' detection rule is designed to identify Kubernetes API requests that originate from known indicators of compromise (IOCs). These requests could potentially signify malicious activity, especially if they are tracing back to an IP known for nefarious uses, such as being associated with the Tor network. By monitoring GCP audit logs, the detection mechanism analyzes API calls to flag any requests that meet the IOC criteria. When triggered, the rule provides a clear action item: the originating IP address should be added to a banned address list to mitigate risk and enhance the security posture of the environment. The rule aligns with the MITRE ATT&CK framework, specifically focusing on techniques associated with command and control operations, providing robust threat detection within Kubernetes environments.
Categories
- Cloud
- Kubernetes
- Infrastructure
Data Sources
- Group
- Application Log
- Network Traffic
ATT&CK Techniques
- T1573.002
Created: 2024-02-13