
Summary
The Kubernetes detection rule labeled 'Kubernetes ClusterRoleBinding to Privileged Role' monitors for the creation of ClusterRoleBindings that confer privileged roles, specifically those equivalent to 'cluster-admin' or 'system:masters'. This rule is crucial as unauthorized privilege escalation is a common tactic employed by attackers aiming for full control of Kubernetes clusters. Upon detecting the creation of such roles, immediate investigation is recommended to determine the legitimacy of the request. Legitimate administrator actions do occur, hence differentiating between malicious and authorized use is essential. The runbook outlines steps for incident response, including reviewing user permissions, auditing actions of users who created the binding, and checking for other related changes in RBAC configurations across clusters. Key attributes of interest include username and source labels from the logs. This rule enables stronger security postures in Kubernetes environments, particularly against privilege escalation attempts.
Categories
- Kubernetes
- Cloud
- Infrastructure
Data Sources
- Pod
- Container
- User Account
- Cloud Service
ATT&CK Techniques
- T1078.004
- T1098
Created: 2026-02-18