heroui logo

GCP K8S Pod Create Or Modify Host Path Volume Mount

Panther Rules

View Source
Summary
This detection rule monitors for the creation or modification of Kubernetes pods that utilize a hostPath volume mount within Google Cloud Platform (GCP). The use of hostPath volumes in Kubernetes can pose security risks, such as privilege escalation and potential data exfiltration, since it allows containers to access files directly from the host's filesystem. This practice is generally discouraged, especially in production environments, due to the increased risk of unauthorized access to sensitive data or system resources. The rule is triggered when audit logs indicate that a pod has been created or modified with a hostPath configuration, prompting an investigation to ensure that the use of this volume type is justified and secure. If a pod is detected with a hostPath volume mount, the recommendation is to create a ticket and do further risk assessment to establish whether the change is necessary or appropriate.
Categories
  • Kubernetes
  • Cloud
  • GCP
Data Sources
  • Kernel
  • Container
  • Pod
  • Cloud Service
ATT&CK Techniques
  • T1041
  • T1611
Created: 2024-02-21