[New Rule] Kubernetes Pod Creation Using Common Debug or Base Images#5890
[New Rule] Kubernetes Pod Creation Using Common Debug or Base Images#5890
Conversation
Rule: New - GuidelinesThese guidelines serve as a reminder set of considerations when proposing a new rule. Documentation and Context
Rule Metadata Checks
New BBR Rules
Testing and Validation
|
| kubernetes.audit.verb:"create" and | ||
| kubernetes.audit.requestObject.spec.containers.image:(alpine* or busybox* or ubuntu\:* or debian\:* or *netshoot\:* or *network-multitool\:* or *curl\:*) | ||
| ''' | ||
|
|
There was a problem hiding this comment.
The image patterns have inconsistent coverage for private registries. *netshoot\:*, *network-multitool\:*, and *curl\:* use a leading wildcard to match images pulled from private registries (e.g., gcr.io/proj/netshoot:latest), but alpine*, busybox*, ubuntu\:*, and debian\:* don't. In hardened environments images are typically pulled from private registries, so gcr.io/myproject/alpine:3.18 would be missed. Would normalizing all patterns to use a leading wildcard (e.g., *alpine\:*, *busybox\:*) make sense here?
|
|
||
| [rule.threat.tactic] | ||
| id = "TA0005" | ||
| name = "Defense Evasion" |
There was a problem hiding this comment.
T1610 (Deploy Container) is mapped to Execution in MITRE ATT&CK, not Defense Evasion. Should this second tactic block use a different technique, or be removed?
There was a problem hiding this comment.
Its listed under both. Should be g2g
| "Domain: Kubernetes", | ||
| "Use Case: Threat Detection", | ||
| "Tactic: Execution", | ||
| "Tactic: Defense Evasion", |
There was a problem hiding this comment.
Thoughts on a BBR at first? Pod provisioning for these images I can imagine are quite common.
There was a problem hiding this comment.
I agree, I think it's smart to make this a new terms though. But even then, these are all such commonly used container images that may not reduce noise enough. I would monitor as a BBR first in case noise is still an issue
terrancedejesus
left a comment
There was a problem hiding this comment.
Maybe make BBR first due to commonality of images used.
Summary
Detects successful Kubernetes pod creation requests using commonly abused base and debugging container images such as BusyBox, Alpine, Ubuntu, Netshoot, and network multitool variants. These images are frequently used by attackers to deploy short-lived or interactive "throwaway" containers for reconnaissance, payload staging, or command execution due to their small footprint or built-in tooling.