Synopsis
Activation Period |
14 Days |
Training Period |
30 Days |
Test Period |
N/A (single event) |
Deduplication Period |
5 Days |
Required Data |
|
Detection Modules |
|
Detector Tags |
Kubernetes - AGENT |
ATT&CK Tactic |
|
ATT&CK Technique |
|
Severity |
Informational |
Description
A process accessed a Kubernetes node configuration file.
Attacker's Goals
Gain access to the Kubernetes environment.
Investigative actions
- Look for additional suspicious activities.
- Verify if the exposed credentials were used to access the API server.
- Investigate which operations were used against the Kubernetes cluster with the exposed credentials.
Variations
Access to Kubernetes configuration file by an unusual processAccess to Kubernetes configuration file from an unusual Kubernetes pod
Access to Kubernetes configuration file from a Kubernetes pod