
Summary
This detection rule is designed to identify when Kubernetes accounts access sensitive objects within Azure Kubernetes Service (AKS), specifically configmaps and secrets. The rule triggers when operations involving the writing or deleting of these sensitive objects are detected in the activity logs of Azure. It serves as a vital security measure given that compromising these objects can lead to unauthorized access to sensitive data or configurations, potentially impacting the integrity and confidentiality of containerized applications. The rule outlines specific operations that trigger alerts, which include writing and deleting configmaps and secrets, and emphasizes the importance of monitoring these actions to prevent malicious activity or misconfigurations. False positives may occur, particularly when system administrators access these objects; thus, it's crucial to verify the legitimacy of the accessing users by checking their identity, agent, and hostname. If the behavior is known and acceptable, it can be exempted from the detection criteria to minimize unnecessary alerts.
Categories
- Cloud
- Kubernetes
- Containers
Data Sources
- Cloud Service
- Logon Session
Created: 2021-08-07