-
Notifications
You must be signed in to change notification settings - Fork 612
Open
Labels
Domain: Cloud WorkloadsIntegration: Azureazure related rulesazure related rulesRule: NewProposal for new ruleProposal for new rulebacklogcommunityv8.3.0Rules for 8.3.0Rules for 8.3.0
Description
Description
Identifies when a Kubernetes account access sensitive objects in a Kubernetes cluster.
Required Info
Target indexes
filebeat-*, logs-azure*
Optional Info
Query
event.dataset:azure.activitylogs and azure.activitylogs.operation_name:
(
"MICROSOFT.KUBERNETES/CONNECTEDCLUSTERS/CONFIGMAPS/WRITE" or
"MICROSOFT.KUBERNETES/CONNECTEDCLUSTERS/CONFIGMAPS/DELETE" or
"MICROSOFT.KUBERNETES/CONNECTEDCLUSTERS/SECRETS/WRITE" or
"MICROSOFT.KUBERNETES/CONNECTEDCLUSTERS/SECRETS/DELETE"
) and
event.outcome:(Success or success)
New fields required in ECS/data sources for this rule?
Related issues or PRs
False Positives
MITRE
| Tactic | Technique ID | Technique Name | Sub-Technique Name |
|---|---|---|---|
References
- https://www.microsoft.com/security/blog/2021/03/23/secure-containerized-environments-with-updated-threat-matrix-for-kubernetes/
- https://www.microsoft.com/security/blog/2020/04/02/attack-matrix-kubernetes/
- https://medium.com/mitre-engenuity/att-ck-for-containers-now-available-4c2359654bf1
- https://attack.mitre.org/matrices/enterprise/cloud/
- https://medium.com/mitre-engenuity/the-evolution-of-a-matrix-how-att-ck-for-containers-was-built-f5ca7fdbcb3f
Metadata
Metadata
Assignees
Labels
Domain: Cloud WorkloadsIntegration: Azureazure related rulesazure related rulesRule: NewProposal for new ruleProposal for new rulebacklogcommunityv8.3.0Rules for 8.3.0Rules for 8.3.0