
Summary
The rule named "EKS Anonymous API Access Detected" aims to identify attempts to access the Kubernetes API server without proper authentication, which is a security risk in production environments. Anonymous access to the Kubernetes API can lead to unauthorized users gaining insights or further access within the cluster. This rule inspects logs generated by Amazon EKS and looks for any requests that are made by a user denoted as "system:anonymous". In a properly secured environment, anonymous access should be disabled, thus any incidents of such access could indicate a potential security vulnerability. By validating the presence of these logs, security teams can ensure compliance with best practices for securing Kubernetes clusters, especially in relation to identity management and overall API security.
Categories
- Cloud
- Kubernetes
- Infrastructure
Data Sources
- Kernel
- Cloud Service
- Logon Session
- Application Log
ATT&CK Techniques
- T1190
Created: 2024-11-04