
Summary
The detection rule GCP.K8s.ExecIntoPod aims to monitor and alert on instances where users attempt to execute commands within a Kubernetes pod in GCP (Google Cloud Platform) environments. The rule can be configured to specify allowed users and particular projects, thereby making it possible to enforce tighter security controls on Kubernetes access. It primarily logs GCP Audit Logs to detect unauthorized actions. When the exec command is executed, the relevant details such as the user invoking the command, resource information, and permissions requested are logged for analysis. Users are cautioned against executing commands inside pods unless absolutely necessary, as this practice can lead to potential security vulnerabilities. Investigative measures and mitigation actions are outlined in the accompanying runbook, advising the analysis of the user's intentions and raising tickets for further scrutiny when necessary.
Categories
- Cloud
- Kubernetes
Data Sources
- Group
- Container
- Application Log
- User Account
Created: 2022-09-13