Try in Splunk Security Cloud

Description

This story addresses detection and response of accounts acccesing Kubernetes cluster sensitive objects such as configmaps or secrets providing information on items such as user user, group. object, namespace and authorization reason.

  • Product: Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
  • Datamodel:
  • Last Updated: 2020-05-20
  • Author: Rod Soto, Splunk
  • ID: c7d4dbf0-a171-4eaf-8444-4f40392e4f92

Narrative

Kubernetes is the most used container orchestration platform, this orchestration platform contains sensitive objects within its architecture, specifically configmaps and secrets, if accessed by an attacker can lead to further compromise. These searches allow operator to detect suspicious requests against Kubernetes sensitive objects.

Detections

Name Technique Type
AWS EKS Kubernetes cluster sensitive object access None Hunting
Kubernetes AWS detect service accounts forbidden failure access None Hunting
Kubernetes Azure detect sensitive object access None Hunting
Kubernetes Azure detect service accounts forbidden failure access None Hunting
Kubernetes Azure detect suspicious kubectl calls None Hunting
Kubernetes GCP detect sensitive object access None Hunting
Kubernetes GCP detect service accounts forbidden failure access None Hunting
Kubernetes GCP detect suspicious kubectl calls None Hunting
Kubernetes AWS detect suspicious kubectl calls None Hunting

Reference

source | version: 1