Synopsis
Activation Period |
14 Days |
Training Period |
30 Days |
Test Period |
10 Minutes |
Deduplication Period |
1 Day |
Required Data |
|
Detection Modules |
Cloud |
Detector Tags |
Cloud Data Asset Exfiltration, Data Detection & Response |
ATT&CK Tactic |
|
ATT&CK Technique |
|
Severity |
Low |
Description
A process accessed both the Kubelet credentials and the Kubernetes CA certificate, indicating an attempt to impersonate the node agent and communicate with the API server.
Attacker's Goals
Impersonate the node agent to gain control over the cluster.
Investigative actions
- Look for additional suspicious activities.
- Verify if the exposed credentials were used to access the API server.
- Investigate which operations were used against the Kubernetes cluster with the exposed credentials.