b399d856a1
* [New] AWS Lateral Movement from Kubernetes SA via AssumeRoleWithWebIdentity Detects when credentials issued through `AssumeRoleWithWebIdentity` for a Kubernetes service account identity are later used for several distinct AWS control-plane actions on the same session access key. Workloads that use EKS IAM Roles for Service Accounts routinely exchange a projected service-account token for short-lived IAM credentials; this rule highlights sessions where that exchange is followed by a spread of sensitive APIs—reconnaissance, secrets and parameter access, IAM changes, or compute creation—beyond what routine pod traffic usually shows. * Update initial_access_assumed_web_identity_session_with_multi_phase_api_use.toml * Update and rename initial_access_assumed_web_identity_session_with_multi_phase_api_use.toml to lateral_movement_k8_assumed_web_identity_session_with_multi_phase_api_use.toml * Create initial_access_assume_role_with_web_identity_kubernetes_sa_from_external_asn.toml * Update initial_access_assume_role_with_web_identity_kubernetes_sa_from_external_asn.toml * Update initial_access_assume_role_with_web_identity_kubernetes_sa_from_external_asn.toml * Update initial_access_assume_role_with_web_identity_kubernetes_sa_from_external_asn.toml * [New] Potential Privilege Escalation in Container via Runc Init Identifies audit events for `runc init` child processes where the effective user is root and the login user ID is not root. This pattern can indicate privilege escalation or credential separation abuse inside container runtimes, where a process executes with elevated effective privileges while retaining a non-root audit identity. * Update rules/linux/privilege_escalation_container_runc_init_effective_root_auditd.toml Co-authored-by: Mika Ayenson, PhD <Mikaayenson@users.noreply.github.com> * Delete rules/linux/privilege_escalation_container_runc_init_effective_root_auditd.toml * Update rules/integrations/aws/initial_access_assume_role_with_web_identity_kubernetes_sa_from_external_asn.toml Co-authored-by: Isai <59296946+imays11@users.noreply.github.com> * Apply suggestion from @imays11 Co-authored-by: Isai <59296946+imays11@users.noreply.github.com> * Update rules/integrations/aws/lateral_movement_k8_assumed_web_identity_session_with_multi_phase_api_use.toml Co-authored-by: Isai <59296946+imays11@users.noreply.github.com> * Update rules/integrations/aws/lateral_movement_k8_assumed_web_identity_session_with_multi_phase_api_use.toml Co-authored-by: Isai <59296946+imays11@users.noreply.github.com> * Update rules/integrations/aws/initial_access_assume_role_with_web_identity_kubernetes_sa_from_external_asn.toml Co-authored-by: Terrance DeJesus <99630311+terrancedejesus@users.noreply.github.com> * Apply suggestion from @terrancedejesus Co-authored-by: Terrance DeJesus <99630311+terrancedejesus@users.noreply.github.com> * Apply suggestion from @terrancedejesus Co-authored-by: Terrance DeJesus <99630311+terrancedejesus@users.noreply.github.com> * Update lateral_movement_k8_assumed_web_identity_session_with_multi_phase_api_use.toml --------- Co-authored-by: Mika Ayenson, PhD <Mikaayenson@users.noreply.github.com> Co-authored-by: Isai <59296946+imays11@users.noreply.github.com> Co-authored-by: Terrance DeJesus <99630311+terrancedejesus@users.noreply.github.com>