heroui logo

Kubernetes Unauthorized Access

Splunk Security Content

View Source
Summary
The 'Kubernetes Unauthorized Access' detection rule is designed to track and identify unauthorized access attempts to a Kubernetes cluster by analyzing Kubernetes audit logs. This rule focuses on recognizing anomalies in access patterns, particularly by examining the request sources and their corresponding response statuses. If an unauthorized attempt is detected—indicated by a 'Forbidden' response status—the rule may highlight potential security incidents, suggesting an attacker may be trying to gain entry into the Kubernetes environment. Such incidents are critical to monitor as they could lead to unauthorized control over Kubernetes resources, endangering sensitive data and systems within the cluster. Implementing this detection requires ensuring that audit logging is configured correctly within the Kubernetes environment, and the corresponding logs are collected efficiently to support real-time monitoring.
Categories
  • Kubernetes
  • Cloud
  • Infrastructure
Data Sources
  • Kernel
ATT&CK Techniques
  • T1204
Created: 2024-11-14