heroui logo

Kubernetes Scanning by Unauthenticated IP Address

Splunk Security Content

View Source
Summary
This detection rule identifies potential unauthorized scanning activities in Kubernetes environments originating from unauthenticated IP addresses. By analyzing Kubernetes audit logs, the rule flags multiple instances of HTTP 403 (forbidden) responses coming from the same IP address, indicating that an attacker may be probing the Kubernetes API for vulnerabilities. This behavior suggests an attempt to exploit known security issues or gain unauthorized access. If verified as malicious, such scanning can lead to severe risks including unauthorized access, data breaches, and exploitation of the Kubernetes infrastructure. Integration of this rule requires enabling audit logging in Kubernetes and configuring data collection through tools like Splunk OpenTelemetry Collector to ensure comprehensive monitoring and alerting capabilities against these potential threats.
Categories
  • Kubernetes
  • Cloud
  • Network
Data Sources
  • Kernel
  • Kernel
ATT&CK Techniques
  • T1046
Created: 2024-11-14