
Summary
The detection rule identifies attempts to create or modify Kubernetes pods with HostNetwork enabled, which allows such pods to access the host network namespace. This capability poses a security risk because it enables potential attackers to monitor network activity from other pods running on the same node and circumvent any restrictive network policies that may be enforced in their namespace. The rule is built to flag events involving pod creation or modification with HostNetwork set to true, focusing on log entries that meet certain conditions such as specific verbs ('create', 'update', or 'patch') and excluding known benign container images. The authority for such actions can be validated through Kubernetes audit logs, where the user responsible for the change can be identified. Through a detailed investigation process, including inspecting pod configurations and traffic analysis, security teams can discern unauthorized pod activities and take appropriate remediation steps to secure the cluster.
Categories
- Kubernetes
- Cloud
- Infrastructure
Data Sources
- Pod
- Container
- Network Traffic
ATT&CK Techniques
- T1611
- T1610
Created: 2022-07-05