LoFP LoFP / azure aks kubernetes cluster

TitleTags
not all rbac authorications are malicious. rbac authorizations can uncover malicious activity specially if sensitive roles have been granted.
not all unauthenticated requests are malicious, but source ips, useragent, verb, request uri and response status will provide context.
sensitive object access is not necessarily malicious but user and object context can provide guidance for detection.
this search can give false positives as there might be inherent issues with authentications and permissions at cluster.