
Summary
This detection rule is designed to identify potentially malicious activity within a Kubernetes environment by monitoring for forbidden requests made from unusual user agents. Adversaries may attempt to disguise their actions by employing non-standard user agents while interacting with the Kubernetes API, which can serve to obfuscate their activities and evade detection mechanisms. When such requests are recognized as forbidden, it raises the likelihood of an attempt to exploit known vulnerabilities or misconfigurations within the cluster. This rule utilizes a query that focuses on Linux hosts, specifically scrutinizing Kubernetes audit logs for events marking the request response as 'complete' and decisions logged as 'forbid'. It also includes extensive filtering conditions to exclude recognized legitimate user agents tied to various operational tools and operators. By flagging these suspicious activities, the rule aids in maintaining the security posture of the Kubernetes infrastructure.
Categories
- Cloud
- Kubernetes
- Containers
Data Sources
- Kernel
- Container
Created: 2025-06-17