elastic / detection-rules

https://www.elastic.co/guide/en/security/current/detection-engine-overview.html
Other
1.85k stars 462 forks source link

[New Rule] Azure Kubernetes Secret or Config Object Access #1412

Open austinsonger opened 2 years ago

austinsonger commented 2 years ago

Description

Identifies when a Kubernetes account access sensitive objects in a Kubernetes cluster.

Required Info

Target indexes

filebeat-*, logs-azure*

Optional Info

Query

event.dataset:azure.activitylogs and azure.activitylogs.operation_name:
    (
        "MICROSOFT.KUBERNETES/CONNECTEDCLUSTERS/CONFIGMAPS/WRITE" or
        "MICROSOFT.KUBERNETES/CONNECTEDCLUSTERS/CONFIGMAPS/DELETE" or
        "MICROSOFT.KUBERNETES/CONNECTEDCLUSTERS/SECRETS/WRITE" or
        "MICROSOFT.KUBERNETES/CONNECTEDCLUSTERS/SECRETS/DELETE"
    ) and 
event.outcome:(Success or success)

New fields required in ECS/data sources for this rule?

Related issues or PRs

False Positives

MITRE

Tactic Technique ID Technique Name Sub-Technique Name

References

botelastic[bot] commented 2 years ago

This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Thank you for your contributions.

austinsonger commented 2 years ago

Just keeping it open.

botelastic[bot] commented 2 years ago

This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Thank you for your contributions.

botelastic[bot] commented 2 years ago

This has been closed due to inactivity. If you feel this is an error, please re-open and include a justifying comment.