
Summary
This detection rule identifies modifications or deletions of service accounts within Azure Kubernetes Service (AKS). Service accounts are crucial as they allow applications running in a Kubernetes cluster to communicate with the API server and manage resources securely. Unauthorized modifications or deletions can lead to privilege escalation, service disruptions, or unauthorized access. The rule triggers on specific operations related to service account management, such as writing or deleting service accounts or impersonation actions. Monitoring these activities is essential to maintain the security posture of Kubernetes environments, especially in a multi-tenant setup where service accounts can become vectors for attacks. Users should also be aware of legitimate administrative activities that may trigger false positives, such as routine maintenance by system administrators. Proper investigation and logging of changes can help distinguish between normal activities and potential security incidents.
Categories
- Cloud
- Kubernetes
Data Sources
- Cloud Service
- Image
Created: 2021-08-07