
Summary
The 'Kubectl Permission Discovery' rule is designed to detect the execution of the 'kubectl auth --can-i' command in Kubernetes environments. This command is typically used to verify permissions and access rights within a cluster. From a security perspective, its usage is concerning as it may indicate an attacker enumerating permissions to identify misconfigurations or vulnerabilities that allow unauthorized access or privilege escalation. The rule is configured to monitor process events on Linux systems within the defined time frame. It utilizes EQL to capture relevant process execution with specific arguments indicating permission checks, enhancing the ability to spot potentially malicious exploration of Kubernetes clusters. Given its low severity and risk score of 21, the rule can be integrated into an organization's existing threat detection framework primarily using Elastic's security products such as Elastic Defend. For effective operation, it necessitates data collected through Elastic Agent and Fleet. The setup process is documented to ensure proper integration and functionality in maintaining endpoint security against such discovery tactics.
Categories
- Kubernetes
- Containers
- Linux
- Application
- Endpoint
Data Sources
- Process
- Container
ATT&CK Techniques
- T1613
Created: 2025-06-17