Skip to content

[New Rule] Azure Kubernetes Secret or Config Object Access #1412

@austinsonger

Description

@austinsonger

Description

Identifies when a Kubernetes account access sensitive objects in a Kubernetes cluster.

Required Info

Target indexes

filebeat-*, logs-azure*

Optional Info

Query

event.dataset:azure.activitylogs and azure.activitylogs.operation_name:
    (
        "MICROSOFT.KUBERNETES/CONNECTEDCLUSTERS/CONFIGMAPS/WRITE" or
        "MICROSOFT.KUBERNETES/CONNECTEDCLUSTERS/CONFIGMAPS/DELETE" or
        "MICROSOFT.KUBERNETES/CONNECTEDCLUSTERS/SECRETS/WRITE" or
        "MICROSOFT.KUBERNETES/CONNECTEDCLUSTERS/SECRETS/DELETE"
    ) and 
event.outcome:(Success or success)

New fields required in ECS/data sources for this rule?

Related issues or PRs

False Positives

MITRE

Tactic Technique ID Technique Name Sub-Technique Name

References

Metadata

Metadata

Type

No type

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions