heroui logo

Kubernetes Suspicious Image Pulling

Splunk Security Content

View Source
Summary
The Kubernetes Suspicious Image Pulling detection rule monitors audit logs in Kubernetes environments for any image pull requests that deviate from a predefined list of allowed images. By analyzing the `kube_audit` logs, this rule identifies potentially malicious activities where attackers might try to deploy unauthorized or harmful container images to the cluster. Such occurrences should raise alarms for Security Operations Centers (SOC) as they may lead to unauthorized access or exploitation of sensitive information within the Kubernetes infrastructure. Implementing this detection requires enabling audit logging in the Kubernetes environment, which tracks requests to the API server and can help in devising responsive security measures.
Categories
  • Kubernetes
  • Cloud
Data Sources
  • Kernel
  • Process
  • Pod
ATT&CK Techniques
  • T1526
Created: 2024-11-14