
Summary
The rule "Azure Kubernetes Events Deleted" is designed to detect instances when events are deleted within Azure Kubernetes Service (AKS). Kubernetes events serve as logs for state changes in containerized applications, such as the creation of containers or scheduling of pods. Deletion of these events can indicate malicious activity aimed at evading detection mechanisms. This rule triggers alerts when it identifies deletion operations in Azure activity logs that are marked as successful. The rule employs a specific query to filter activity logs, aiming to catch unauthorized deletions and strengthen the security posture of Kubernetes environments. Investigations subsequent to alerts should focus on verifying the legitimacy of the deletions and the identities involved. Through meticulous analysis, security teams can address potential threats and reinforce monitoring practices.
Categories
- Cloud
- Kubernetes
- Infrastructure
- Identity Management
- Other
Data Sources
- Cloud Service
- Logon Session
- Application Log
- Network Traffic
- User Account
ATT&CK Techniques
- T1562
- T1562.001
Created: 2021-06-24