heroui logo

Amazon EKS Kubernetes Pod scan detection

Splunk Security Content

View Source
Summary
This analytic rule is designed to detect unauthorized access attempts against the Kubernetes Pods API within an Amazon EKS environment. It primarily identifies unauthenticated requests coming from the 'system:anonymous' user, focusing on actions where the verb is 'list' and the targeted resource is 'pods'. Such requests, specifically those made to the '/api/v1/pods' endpoint, raise concerns as they can indicate potential malicious activities aimed at enumerating sensitive resources. By filtering for events in the 'aws_cloudwatchlogs_eks' data source, the rule aggregates data, providing insights into the frequency of these requests along with relevant metadata such as response status and user agent information. If these unauthorized access attempts are confirmed as malicious, they could lead to serious risks including data breaches, unauthorized command executions, or lateral movements within the cluster, making it crucial for organizations to monitor and respond to these alerts appropriately.
Categories
  • Cloud
  • Kubernetes
  • Containers
Data Sources
  • Cloud Service
  • Container
  • Pod
ATT&CK Techniques
  • T1526
Created: 2024-11-14