
Summary
The Google Cloud Kubernetes Admission Controller rule aims to detect operations related to admission controllers executing within a GCP Kubernetes environment. Specifically, it identifies interactions with the Kubernetes API server, which can be intercepted and manipulated by malicious actors through the deployment of admission webhooks (either MutatingAdmissionWebhook or ValidatingAdmissionWebhook). These webhooks can grant attackers persistence by allowing them to modify pod creation requests. For instance, a compromised mutating webhook could insert malicious containers into every newly created pod, while a validating webhook might be exploited to access sensitive credentials and secrets. This rule captures API method names associated with admission controller operations involving creation, patching, or replacing webhook configurations. Given the potential severity of exploitation, the detection of such activities is vital for maintaining cluster security.
Categories
- Cloud
- Kubernetes
Data Sources
- Cloud Service
- Application Log
Created: 2021-11-25