heroui logo

Kubernetes AWS detect most active service accounts by pod

Splunk Security Content

View Source
Summary
This detection rule is designed to identify and analyze the activity of Kubernetes service accounts that interact with pods in AWS EKS environments. By leveraging AWS CloudWatch logs, the rule queries logs to track interactions by specific attributes including the source IP of the service accounts, user names, the verbs used in their requests, and the decision made by the Kubernetes authorization system. This information is collated to produce a report highlighting the most active service accounts, which can be useful for spotting potential misuse or suspicious activity. The search output focuses on displaying essential fields that depict service account behavior, with the possibility of filtering through additional criteria. However, given the rule is marked as deprecated, it may no longer be actively maintained or recommended for use, guiding analysts toward evaluating the context of service account activities critically, to distinguish between genuine and potentially malicious interactions.
Categories
  • Cloud
  • Kubernetes
Data Sources
  • Cloud Service
  • Application Log
Created: 2024-11-14