
Summary
This rule, authored by Elastic, is designed to detect the creation or modification of sensitive Kubernetes configuration files on Linux systems. The pivotal role of these files includes Kubernetes manifests, PKI files, and other configurations integral to the smooth operation of Kubernetes clusters. By continuously monitoring these files, system administrators can identify unauthorized changes that may signal an attempt by attackers to create persistence mechanisms or deploy malicious containers in the Kubernetes environment. It is crucial as these configurations are critical for maintaining the security posture of Kubernetes clusters. The rule utilizes EQL (Event Query Language) to filter file events based on specified paths, ensuring that any modifications (except deletions) are flagged if the processes initiating these changes are suspicious or not related to known Kubernetes management processes like 'kubeadm' or 'kubelet'. The overall aim is to preemptively catch potential vulnerabilities in Kubernetes setups before they are exploited.
Categories
- Endpoint
- Kubernetes
- Containers
Data Sources
- File
- Network Traffic
ATT&CK Techniques
- T1543
- T1543.005
- T1053
- T1053.007
Created: 2025-06-26