
Summary
The rule `GCP.K8s.New.Daemonset.Deployed` is designed to detect the creation of Daemonsets in Google Cloud Platform (GCP) Kubernetes clusters. Daemonsets ensure that a copy of a pod runs across all the nodes in a cluster, which can be benign for operations or an indicator of possible malicious activity, as they could be utilized for privilege escalation or establishing a persistent foothold within the environment. When a Daemonset is created, an event is logged in the GCP Audit Log under `GCP.AuditLog`. This rule monitors these logs specifically looking for the permission `io.k8s.apps.v1.daemonsets.create`. If this permission is granted, it indicates that a new Daemonset has been deployed. The severity of this event is categorized as medium, signaling the need for further investigation to ensure it aligns with expected operations. The rule includes a deduplication period of 60 minutes and requires at least one occurrence of the activity to trigger an alert. The associated MITRE ATT&CK tactic T1610 may link this activity to privilege escalation attempts. Responses should include case creation for any suspicious findings after investigation as per the specified runbook.
Categories
- Kubernetes
- Cloud
- GCP
Data Sources
- Group
- Logon Session
- Cloud Service
- Application Log
- Network Traffic
ATT&CK Techniques
- T1610
Created: 2024-02-27