heroui logo

GCP K8s New Daemonset Deployed

Panther Rules

View Source
Summary
The rule `GCP.K8s.New.Daemonset.Deployed` is designed to detect the creation of Daemonsets in Google Cloud Platform (GCP) Kubernetes clusters. Daemonsets ensure that a copy of a pod runs across all the nodes in a cluster, which can be benign for operations or an indicator of possible malicious activity, as they could be utilized for privilege escalation or establishing a persistent foothold within the environment. When a Daemonset is created, an event is logged in the GCP Audit Log under `GCP.AuditLog`. This rule monitors these logs specifically looking for the permission `io.k8s.apps.v1.daemonsets.create`. If this permission is granted, it indicates that a new Daemonset has been deployed. The severity of this event is categorized as medium, signaling the need for further investigation to ensure it aligns with expected operations. The rule includes a deduplication period of 60 minutes and requires at least one occurrence of the activity to trigger an alert. The associated MITRE ATT&CK tactic T1610 may link this activity to privilege escalation attempts. Responses should include case creation for any suspicious findings after investigation as per the specified runbook.
Categories
  • Kubernetes
  • Cloud
  • GCP
Data Sources
  • Group
  • Logon Session
  • Cloud Service
  • Application Log
  • Network Traffic
ATT&CK Techniques
  • T1610
Created: 2024-02-27