User Exec into a Pod

Set up the kubernetes integration.

This page is not yet available in Spanish. We are working on its translation.
If you have any questions or feedback about our current translation project, feel free to reach out to us!

Goal

Detect when a user execs into a pod.

Strategy

This rule monitors when a user execs (@objectRef.subresource:exec) into to a pod (@objectRef.resource:pods).

A user should not need to exec into a pod. Execing into a pod allows a user to execute any process in container which is not already running. It is most common to execute the bash process to gain an interactive shell. If this is an attacker, they can access any data which the pod has permissions to, including secrets.

Triage and response

Determine if the user should be execing into a running container.

Changelog

  • 7 May 2024 - Updated detection query to include logs from Azure Kubernetes Service.
  • 17 July 2024 - Updated detection query to include logs from Google Kubernetes Engine.
PREVIEWING: esther/docs-9478-fix-split-after-example