
Summary
This rule detects deletions of Azure Kubernetes Pods within an Azure environment. It specifically looks for the operation named 'MICROSOFT.KUBERNETES/CONNECTEDCLUSTERS/PODS/DELETE' in the Azure activity logs. Deleted Pods may indicate unauthorized activity or potential impact on application availability and should be monitored closely. The detection mechanism is simple: it triggers an alert whenever the specified operation is logged. Given the nature of Kubernetes, where pods can be deleted for various reasons by administrators, care must be taken to distinguish between legitimate administrative changes and potentially malicious deletions. The rule emphasizes the need for investigating deletions that originate from unfamiliar user accounts or hosts, while also providing guidance for classifying false positives related to known administrative actions.
Categories
- Cloud
- Kubernetes
- Containers
Data Sources
- Cloud Service
- Logon Session
Created: 2021-07-24