
Summary
The detection rule 'Kubernetes Privileged Pod Created' is designed to monitor and alert on the creation of pods that run with privileged security contexts in Kubernetes environments. Such pods inherit extensive permissions that can allow full access to the host node, the ability to modify critical resources, and can serve as gateways for privilege escalation attacks. This detection mechanism leverages audit logs across various cloud platforms, including Amazon EKS, Azure, and GCP, to identify events where pods are created with privileged settings. The rule encourages proactive monitoring of user activity by checking the deployment history of the user responsible for creating the pod and correlating it with related API calls to derive context. The ruleset combines detection specificity with operational response strategies to mitigate the risks associated with privileged pod deployments in clusters, thus enhancing the security posture of Kubernetes environments.
Categories
- Kubernetes
- Cloud
- Infrastructure
Data Sources
- Pod
- Cloud Service
- Logon Session
ATT&CK Techniques
- T1548.003
Created: 2026-02-18