heroui logo

Kubernetes Create or Update Privileged Pod

Splunk Security Content

View Source
Summary
This rule is designed to detect the creation or update of privileged pods within a Kubernetes environment by monitoring Kubernetes Audit logs specifically for configurations that include root privileges. The detection mechanism focuses on activities where pods are either created or modified to have elevated permissions, which can signify an attempt at privilege escalation or exploitation within the system. By analyzing the Kubernetes Audit logs, the rule captures these significant changes in pod configurations that may give unauthorized access to sensitive information or the host's underlying resources. If this activity is deemed malicious, it may lead to serious implications such as data breaches or service outages, thereby warranting close attention and prompt investigation by security operations teams.
Categories
  • Kubernetes
  • Cloud
  • Infrastructure
Data Sources
  • Kernel
  • Kernel
  • Kernel
  • Kernel
ATT&CK Techniques
  • T1204
Created: 2024-11-14