
Summary
The 'Kubernetes Azure detect sensitive role access' hunting rule is designed to monitor and alert on Kubernetes accounts that access sensitive objects within the Azure Kubernetes Service (AKS). The focus is on identifying access to critical resources such as config maps and secrets, which are essential for maintaining the security and integrity of applications running within AKS. This detection rule utilizes kube-audit logs to look for specific access patterns to resources like cluster roles and cluster role bindings that could indicate unauthorized or malicious intent by users or processes within the Kubernetes environment. By examining the `objectRef.resource` field for references to cluster roles and bindings, the rule filters audit logs to compile a list of users and their associated groups, along with their source IP addresses and namespaces. Duplicates are removed to streamline the information presented. While having access to sensitive roles is necessary for certain operations within a Kubernetes cluster, the analysis of the source IP and user groups may help identify potential misuse of such access. Implementing this rule requires the Add-on for Microsoft Cloud Services and proper configuration of kube-audit data diagnostics. This rule is currently marked as deprecated, suggesting that it has been superseded or is no longer actively maintained.
Categories
- Cloud
- Kubernetes
- Infrastructure
Data Sources
- Kernel
- Cloud Service
Created: 2024-11-14