heroui logo

GCP K8S Service Type NodePort Deployed

Panther Rules

View Source
Summary
The "GCP K8S Service Type NodePort Deployed" detection rule monitors Kubernetes services deployed specifically with the 'NodePort' type in a Google Cloud Platform (GCP) environment. NodePort services allow external traffic to access a set of pods in a cluster by opening a specific port on each node, which can inadvertently expose these pods to the internet. This rule aims to identify potential security risks as the use of NodePort services can bypass network firewalls and security controls, leading to unauthorized access or data interception vulnerabilities. The rule operates based on GCP Audit Logs, providing real-time monitoring capabilities against unapproved changes in service configurations. If such a configuration change is detected, the recommended response is to investigate the rationale for creating a NodePort service and advise against it as a security best practice. Further action may involve ticket creation for remediation, particularly if the NodePort setup is deemed unnecessary or risky.
Categories
  • Kubernetes
  • Cloud
  • Infrastructure
Data Sources
  • Group
  • Application Log
  • Network Traffic
ATT&CK Techniques
  • T1190
Created: 2024-02-27