heroui logo

Kubernetes Access Scanning

Splunk Security Content

View Source
Summary
The Kubernetes Access Scanning rule is designed to detect potentially malicious scanning activities within a Kubernetes environment. It analyzes Kubernetes audit logs to identify unauthorized access attempts and unusual API requests, which may signify preliminary reconnaissance by an attacker. This rule monitors repeated failed access attempts and scrutinizes public API probing. Such behavior can indicate an attacker's efforts to exploit known vulnerabilities, which could lead to unauthorized access to sensitive systems or data. Proper implementation of audit logging in Kubernetes is critical for deploying this detection, ensuring that all significant activities are logged and can be analyzed by security operations center (SOC) teams.
Categories
  • Kubernetes
  • Cloud
  • Infrastructure
Data Sources
  • Kernel
  • Kernel
ATT&CK Techniques
  • T1046
Created: 2024-11-14