Kubernetes principal attempted to enumerate their permissions
이 페이지는 아직 영어로 제공되지 않습니다. 번역 작업 중입니다.
현재 번역 프로젝트에 대한 질문이나 피드백이 있으신 경우
언제든지 연락주시기 바랍니다.Goal
Identify when a user is attempting to enumerate their permissions.
Strategy
This rule identifies when a user attempts to enumerate their permissions, for example, through the use of kubectl auth can-i --list
. This can be an indicator of an attacker having compromised a Kubernetes service account or user and attempting to determine what permissions it has.
Triage and response
- Determine if enumerating the permissions of the user:
{{@usr.id}}
is suspicious. For example, a service account assigned to a web application and enumerating its privileges is highly suspicious, while a group assigned to operations engineers is likely to represent legitimate activity. - Use the Cloud SIEM
User Investigation
dashboard to review any user actions that may have occurred after the potentially malicious action.
Changelog
- 7 May 2024 - Updated detection query to include logs from Azure Kubernetes Service.