heroui logo

GCP Break-glass Container Workload Deployed

Sigma Rules

View Source
Summary
This detection rule is designed to identify the deployment of Kubernetes workloads in Google Cloud Platform (GCP) utilizing the 'break-glass' flag. This flag allows users to bypass the Binary Authorization controls that are typically in place to prevent unverified images from being deployed. When an unauthorized deployment occurs, the deployment request logs an activity within GCP's audit logs, specifically focusing on the creation of pods in a Kubernetes cluster. The rule inspects logs generated by the GCP audit service, checking for specific criteria that signal a break-glass action. The detection involves verifying the resource type pertinent to Kubernetes clusters and the associated log names. If any Kubernetes pod creation actions are identified with the break-glass flag in the image policy, that's flagged as a potential security concern, hence triggering the alert mechanisms. This serves as an important measure for monitoring unusual deployment activities that could signify attempts to bypass security policies.
Categories
  • Cloud
  • Kubernetes
  • Infrastructure
Data Sources
  • Cloud Service
  • Logon Session
  • Process
Created: 2024-01-12