ec827cccb6
Co-authored-by: nasbench <nasbench@users.noreply.github.com>
36 lines
1.1 KiB
YAML
36 lines
1.1 KiB
YAML
title: Kubernetes Rolebinding Modification
|
|
id: 10b97915-ec8d-455f-a815-9a78926585f6
|
|
related:
|
|
- id: 0322d9f2-289a-47c2-b5e1-b63c90901a3e
|
|
type: similar
|
|
status: test
|
|
description: |
|
|
Detects when a Kubernetes Rolebinding is created or modified.
|
|
references:
|
|
- https://kubernetes.io/docs/reference/config-api/apiserver-audit.v1/
|
|
- https://medium.com/@seifeddinerajhi/kubernetes-rbac-privilege-escalation-exploits-and-mitigations-26c07629eeab
|
|
author: kelnage
|
|
date: 2024-07-11
|
|
tags:
|
|
- attack.privilege-escalation
|
|
logsource:
|
|
product: kubernetes
|
|
service: audit
|
|
detection:
|
|
selection:
|
|
objectRef.apiGroup: 'rbac.authorization.k8s.io'
|
|
objectRef.resource:
|
|
- 'clusterrolebindings'
|
|
- 'rolebindings'
|
|
verb:
|
|
- 'create'
|
|
- 'delete'
|
|
- 'patch'
|
|
- 'replace'
|
|
- 'update'
|
|
condition: selection
|
|
falsepositives:
|
|
- Modifying a Kubernetes Rolebinding may need to be done by a system administrator.
|
|
- Automated processes may need to take these actions and may need to be filtered.
|
|
level: medium
|