heroui logo

Kubernetes Events Deleted

Elastic Detection Rules

View Source
Summary
This detection rule monitors for the deletion of Kubernetes events, a behavior indicative of potential malicious activity or misconfigurations. Deleting Kubernetes events can be a tactic employed by adversaries to obscure their actions and hinder incident investigation efforts. The rule uses EQL (Event Query Language) to search through Kubernetes audit logs for any delete verb actions targeting the 'events' resource, specifically when the event stage is 'ResponseComplete'. The intention is to flag these deletions, which may reflect attempts to manipulate or hide relevant security information about previous activities. The rule is categorized under the MITRE ATT&CK framework's Defense Evasion tactic, particularly focusing on the Indicator Removal technique (T1070), enhancing threat detection capability within Kubernetes environments.
Categories
  • Kubernetes
Data Sources
  • Kernel
  • Container
  • Application Log
ATT&CK Techniques
  • T1070
  • T1070.004
Created: 2025-06-27