
Summary
This rule monitors and detects attempts to create or modify Kubernetes pods that leverage the host's IPC (Inter-Process Communication) namespace, which can lead to security vulnerabilities such as unauthorized data access or privilege escalation. Using the host's IPC namespace allows for interactions with shared memory and IPC mechanisms amongst pods, potentially providing attackers with access to sensitive data. The rule filters out legitimate usage cases by focusing on Kubernetes audit logs, particularly looking for pod creation or modification events where hostIPC is enabled and excluding known safe container images. By identifying these events, the rule serves as a critical control point to flag possible security threats within the Kubernetes environment, prompting further investigation. Such threats can be initiated by malicious actors seeking to exploit the shared IPC mechanisms for unauthorized access or to execute malicious activities in a containerized environment. The response guide offers actionable steps for investigation, risk mitigation, and rule adjustment to minimize false positives while addressing real threats.
Categories
- Kubernetes
- Containers
- Cloud
Data Sources
- Kernel
- Pod
- Container
- Process
ATT&CK Techniques
- T1611
- T1610
Created: 2022-07-05