heroui logo

Kubernetes Pod created with a Sensitive hostPath Volume

Elastic Detection Rules

View Source
Summary
This detection rule identifies potentially unsafe Kubernetes pod creations that utilize sensitive hostPath volumes. A hostPath volume allows containers to access the host's filesystem, which can be pivotal for legitimate applications; however, it also presents significant security risks if not managed correctly. If a container gets compromised, attackers could gain access to sensitive data or escalate their privileges by exploiting these volumes. The rule monitors Kubernetes audit logs for events that trigger alerts whenever a pod is created or modified with a hostPath volume linking to sensitive directories. This could include crucial paths like '/etc', '/var', and '/proc', all of which could lead to critical data exposure or privilege escalation. The overall goal of the rule is to flag activities that indicate a potential security risk associated with unrestricted access to the host filesystem.
Categories
  • Kubernetes
  • Cloud
  • On-Premise
Data Sources
  • Pod
  • Container
ATT&CK Techniques
  • T1611
  • T1610
Created: 2022-07-11