heroui logo

Kubernetes Pod With Host Network Attachment

Splunk Security Content

View Source
Summary
This rule detects the creation or modification of Kubernetes pods that are configured to use host network settings by analyzing Kubernetes Audit logs. Using the query provided in its search criteria, it identifies actions where the `hostNetwork` annotation is set to true. This behavior is considered risky because it enables pods to interact directly with the host's network stack, allowing them to capture all network traffic. Consequently, an attacker may exploit this capability to gain sensitive information or escalate privileges. Thus, monitoring for such configurations is critical for maintaining the security and integrity of the Kubernetes environment and preventing unauthorized access or data breaches.
Categories
  • Kubernetes
  • Cloud
Data Sources
  • Kernel
  • Kernel
  • Application Log
ATT&CK Techniques
  • T1204
Created: 2024-11-14