
Summary
This detection rule titled 'Kubernetes Unusual Decision by User Agent' is designed to identify abnormal request responses in Kubernetes audit logs by leveraging the 'new_terms' rule type. It specifically targets instances where the expected API requests made by system components or trusted users deviate from the norm, which is characterized by a consistent user agent and expected response annotations. The rule analyses Kubernetes audit logs to monitor anomalies in the username and response annotations. This helps to flag potential unauthorized access or misconfigurations within Kubernetes environments. The rule is applicable in production settings and involves querying logs that detail the response stages of API interactions. It employs a risk score of 21 and is categorized under a low severity level. By detecting unusual patterns of user agent responses over a set timeframe (last 10 days) against the historical norm, the rule aids security teams in recognizing potential threats to their Kubernetes infrastructure.
Categories
- Kubernetes
- Containers
- Cloud
Data Sources
- Kernel
- Container
- Process
- Application Log
Created: 2025-06-18