heroui logo

Privileged Container Deployed

Sigma Rules

View Source
Summary
This detection rule aims to identify the creation of privileged containers within a Kubernetes environment. A privileged container has heightened access, enabling it to operate with root capabilities on the underlying host system. This means that the container can manipulate system processes, modify resources, access network configurations, and alter filesystem content as if it were the root user. Such capabilities pose significant security risks, particularly if exploited by a malicious actor for container breakout attacks. The rule specifies the parameters for detection, looking for actions that create pods with specific security settings such as the 'securityContext.privileged' flag, as well as configurations that expose the host's network or process IDs ('hostNetwork' or 'hostPID'). Additionally, the rule considers any pod creation attempt that grants excessive Linux capabilities. It is categorized as an experimental detection due to its evolving nature in threat landscapes where container security is paramount.
Categories
  • Kubernetes
  • Containers
  • Cloud
Data Sources
  • Container
  • Application Log
  • Network Traffic
Created: 2024-03-26