
Summary
The Kubernetes CronJob Created or Modified detection rule aims to identify creation or modification events of CronJobs within Kubernetes clusters, focusing on potential malicious activities by unauthorized users. Such actions can signify attempts by attackers to establish persistence mechanisms, automate the execution of harmful code, or maintain backdoor access in the cluster by creating or altering scheduled jobs. This rule functions across major cloud providers, including Amazon EKS, Azure AKS, and Google GKE, and leverages audit logs for contiguous monitoring. The detection process involves analyzing the specifics of CronJob schedules, the user behind the actions, and comparing it against previous behaviors to flag anomalous activities. The rule includes a detailed runbook for incident response, focusing on establishing context through user behavior analysis and examining the characteristics of newly created or modified CronJobs.
Categories
- Kubernetes
- Cloud
- AWS
- Azure
- GCP
Data Sources
- Pod
- Container
- User Account
- Application Log
- Network Traffic
ATT&CK Techniques
- T1053.003
Created: 2026-02-18