heroui logo

Kubernetes Azure scan fingerprint

Splunk Security Content

View Source
Summary
The provided detection rule is designed to identify unauthenticated requests within a Kubernetes cluster hosted on Azure. It utilizes the `kubernetes_azure` data source and filters audit logs to focus specifically on requests that are met with a 401 response status, indicating unauthorized access attempts. By analyzing the source IP addresses, user agents, HTTP request methods, request URIs, and associated reasons for failure, the rule aims to provide insights into potentially malicious scanning activities against Kubernetes API endpoints by tracking unauthenticated access attempts. The implementation involves using the Add-on for Microsoft Cloud Services and configuring Kube-Audit data diagnostics. Although this rule was meant to enhance security monitoring for Azure AKS environments, it is important to note that not all detected unauthenticated requests are inherently malicious, and context is crucial for proper assessment of the threat.
Categories
  • Cloud
  • Kubernetes
  • Azure
Data Sources
  • Kernel
  • Cloud Service
  • Network Traffic
ATT&CK Techniques
  • T1526
Created: 2024-11-14