
Summary
The rule 'GCP K8s Pod Attached To Node Host Network' is designed to detect the creation of Kubernetes pods that are configured to use the host network. Utilizing the host network means that the pod can access all network interfaces on the host, allowing it to capture and inspect network traffic associated with other containers running on the same node. This poses a significant security risk as it can lead to exposure of sensitive information, such as secrets or connection details, which could be exploited by malicious actors. The rule aims to monitor audit logs generated by Google Cloud Platform (GCP) to identify instances where pods are created with this configuration and flag them for further investigation. Best practices advise against using host networking for pods unless absolutely necessary, as it can lead to vulnerabilities and compromise overall container security.
Categories
- Cloud
- Kubernetes
Data Sources
- Pod
- Container
- Network Traffic
- Group
- Application Log
ATT&CK Techniques
- T1611
Created: 2024-03-04