heroui logo

Kubernetes Role With Pod Exec Permissions Created

Panther Rules

View Source
Summary
This detection rule identifies the creation of Kubernetes Roles or ClusterRoles that provide permissions to execute commands inside pods via the pods/exec subresource. Such permissions can facilitate lateral movement and help attackers maintain unauthorized access within the Kubernetes cluster. The creation of roles that include pods/exec can indicate that an attacker is attempting to establish backdoor access, allowing them to execute arbitrary commands. It is critical to monitor RBAC (Role-Based Access Control) events, especially when elevated permissions are granted that could lead to escalating privileges or executing malicious activities across the cluster. This rule outlines a series of investigative steps to ascertain the legitimacy of the role creation and to detect any misuse of the granted permissions.
Categories
  • Kubernetes
  • Cloud
  • Infrastructure
Data Sources
  • Pod
  • User Account
  • Process
  • Application Log
  • Network Traffic
ATT&CK Techniques
  • T1078.004
  • T1021
Created: 2026-02-18