
Summary
The detection rule focuses on identifying the execution of curl commands with insecure flags (-k or --insecure) within the Cisco Isovalent environment. Such behavior is noteworthy as it bypasses SSL/TLS verification, potentially exposing the Kubernetes infrastructure to man-in-the-middle attacks. The rule extracts relevant process execution logs involving curl commands and filters them based on the presence of these insecure flags. By leveraging data from process execution logs, the detection aims to highlight potentially malicious activity that may lead to data interception, unauthorized access, and service disruptions. This behavior is critical for SOC operations, hence the importance of monitoring and investigating these alerts.
Categories
- Cloud
- Kubernetes
- Infrastructure
Data Sources
- Process
ATT&CK Techniques
- T1105
Created: 2026-01-05