
Summary
This detection rule targets the analysis of Kubernetes RBAC (Role-Based Access Control) authorizations specifically in GCP (Google Cloud Platform) environments. The purpose of this rule is to identify potentially unauthorized access patterns by monitoring the RBAC roles assigned to user accounts. By analyzing logs related to RBAC authorizations, security teams can determine whether sensitive roles are being assigned inappropriately, which may indicate malicious intent or misconfigurations. The search utilizes the `google_gcp_pubsub_message` data, filtering for specific reasons and decisions associated with role bindings, and can be modified to show outlier behaviors by adjusting the query. It's important to understand that while this rule can help in identifying potentially malicious configurations, not all detected RBAC authorizations are harmful; analyses should incorporate context to differentiate between legitimate and illegitimate access.
Categories
- Cloud
- Kubernetes
Data Sources
- Cloud Service
- Application Log
Created: 2024-11-14