heroui logo

Potential Remote Command Execution In Pod Container

Sigma Rules

View Source
Summary
This detection rule identifies potential remote command execution within a Pod's container in a Kubernetes environment. It specifically looks for activities involving the usage of the command 'kubectl exec', which allows a user to execute commands directly within a specified Pod. The rule's detection logic focuses on monitoring Kubernetes audit logs for 'create' verbs on Pod resources involving the 'exec' subresource. This is critical for identifying unauthorized command executions that could lead to system compromise or further lateral movement within the cluster. The rule is marked as experimental, allowing for continued improvements based on real-world feedback and performance modifications in operational environments. It’s important to differentiate between legitimate debugging activities and potential malicious actions.
Categories
  • Kubernetes
  • Cloud
  • Containers
Data Sources
  • Pod
  • Container
  • Application Log
Created: 2024-03-26