Kubernetes Azure detect service accounts forbidden failure access
Description
This search provides information on Kubernetes service accounts with failure or forbidden access status
- Type: Hunting
-
Product: Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
- Last Updated: 2020-05-20
- Author: Rod Soto, Splunk
- ID: 019690d7-420f-4da0-b320-f27b09961514
Annotations
ATT&CK
Kill Chain Phase
- Exploitation
NIST
CIS20
CVE
Search
1
2
3
4
5
`kubernetes_azure` category=kube-audit
| spath input=properties.log
| search user.groups{}=system:serviceaccounts* responseStatus.reason=Forbidden
| table sourceIPs{} user.username userAgent verb responseStatus.reason responseStatus.status properties.pod objectRef.namespace
|`kubernetes_azure_detect_service_accounts_forbidden_failure_access_filter`
Macros
The SPL above uses the following Macros:
Note that kubernetes_azure_detect_service_accounts_forbidden_failure_access_filter is a empty macro by default. It allows the user to filter out any results (false positives) without editing the SPL.
Required field
- _time
How To Implement
You must install the Add-on for Microsoft Cloud Services and Configure Kube-Audit data diagnostics
Known False Positives
This search can give false positives as there might be inherent issues with authentications and permissions at cluster.
Associated Analytic story
RBA
Risk Score | Impact | Confidence | Message |
---|---|---|---|
25.0 | 50 | 50 | tbd |
Reference
Test Dataset
Replay any dataset to Splunk Enterprise by using our replay.py tool or the UI. Alternatively you can replay a dataset into a Splunk Attack Range
source | version: 1