heroui logo

Azure Kubernetes RoleBinding/ClusterRoleBinding Modified and Deleted

Sigma Rules

View Source
Summary
This rule is designed to detect potentially malicious actions involving RoleBinding and ClusterRoleBinding objects within Azure Kubernetes Services (AKS). Specifically, it focuses on monitoring for the creation, modification, and deletion of these bindings, which are critical for managing permissions within Kubernetes clusters. Malicious actors may leverage these capabilities to elevate privileges or disrupt services by manipulating access controls, making it essential for security monitoring tools to alert administrators when such changes occur. The detection logic utilizes Azure activity logs to identify specific operations related to RBAC (Role-Based Access Control), such as writes and deletes of RoleBindings and ClusterRoleBindings. By focusing on specific operation names associated with these actions, the rule aims to give security teams visibility into potential threats against their Kubernetes environments. Given the power that these bindings hold over user permissions, any unexpected changes should be investigated promptly to prevent unauthorized access or actions.
Categories
  • Cloud
  • Kubernetes
  • Containers
Data Sources
  • User Account
  • Cloud Service
Created: 2021-08-07