LoFP LoFP / automated processes may need to take these actions and may need to be filtered.

Techniques

Sample rules

Kubernetes CronJob/Job Modification

Description

Detects when a Kubernetes CronJob or Job is created or modified. A Kubernetes Job creates one or more pods to accomplish a specific task, and a CronJob creates Jobs on a recurring schedule. An adversary can take advantage of this Kubernetes object to schedule Jobs to run containers that execute malicious code within a cluster, allowing them to achieve persistence.

Detection logic

condition: selection
selection:
  objectRef.apiGroup: batch
  objectRef.resource:
  - cronjobs
  - jobs
  verb:
  - create
  - delete
  - patch
  - replace
  - update

Kubernetes Secrets Modified or Deleted

Description

Detects when Kubernetes Secrets are Modified or Deleted.

Detection logic

condition: selection
selection:
  objectRef.resource: secrets
  verb:
  - create
  - delete
  - patch
  - replace
  - update

Kubernetes Rolebinding Modification

Description

Detects when a Kubernetes Rolebinding is created or modified.

Detection logic

condition: selection
selection:
  objectRef.apiGroup: rbac.authorization.k8s.io
  objectRef.resource:
  - clusterrolebindings
  - rolebindings
  verb:
  - create
  - delete
  - patch
  - replace
  - update

Kubernetes Admission Controller Modification

Description

Detects when a modification (create, update or replace) action is taken that affects mutating or validating webhook configurations, as they can be used by an adversary to achieve persistence or exfiltrate access credentials.

Detection logic

condition: selection
selection:
  objectRef.apiGroup: admissionregistration.k8s.io
  objectRef.resource:
  - mutatingwebhookconfigurations
  - validatingwebhookconfigurations
  verb:
  - create
  - delete
  - patch
  - replace
  - update