heroui logo

Cisco Isovalent - Cron Job Creation

Splunk Security Content

View Source
Summary
The rule designed to detect the creation of cron jobs within a Cisco Isovalent environment monitors process execution logs specifically targeting the execution of known cron-related commands such as "crond", "cron", and "crontab". This is critical for Security Operations Centers (SOCs) because unauthorized cron job creation may allow attackers to automate malicious tasks, potentially leading to persistent threats against the infrastructure. The detection mechanism processes logs where these commands execute, captures relevant metadata including pod and cluster identifiers, and collates statistical information that can help determine if the activity is anomalous. If flagged, a thorough investigation is recommended to differentiate between benign administrative actions and malicious intent. The rule leverages Cisco Isovalent Runtime Security's capabilities to ensure logs are accurately monitored within Kubernetes clusters and incorporates Splunk's Common Information Model for effective analysis.
Categories
  • Kubernetes
  • Cloud
  • Network
  • Infrastructure
Data Sources
  • Process
ATT&CK Techniques
  • T1053
  • T1053.003
  • T1053.007
Created: 2026-01-05