Skip to content

Latest commit

 

History

History
34 lines (27 loc) · 1.38 KB

MATCH-S00866.md

File metadata and controls

34 lines (27 loc) · 1.38 KB

Rules: Privileged Pod Created on AWS EKS

Description

Privileged containers have all capabilities of the host machine. These privileged containers may perform actions directly on the host that they are running on. Ensure that this event is expected and occurs from a user account or IP address that normally works with privileged containers within the cluster. Customers are encouraged to set up an exclusion list for spec.securitycontext.capabilities for pods that are frequently going to be managed with privileged escalation.

Additional Details

Detail Value
Type Templated Match
Category Privilege Escalation
Apply Risk to Entities srcDevice_ip
Signal Name Privileged Pod Created on AWS EKS by {{srcDevice_ip}}
Summary Expression Privileged Pod Created on AWS EKS by {{srcDevice_ip}}
Score/Severity Static: 5
Enabled by Default True
Prototype False
Tags _mitreAttackTactic:TA0004, _mitreAttackTechnique:T1611

Vendors and Products

Fields Used

Origin Field
Normalized Schema action
Normalized Schema admit-policy"]
Normalized Schema cloud_provider
Normalized Schema cloud_service
Direct from Record fields["message.requestObject.spec.containers.1.securityContext.privileged"]
Normalized Schema srcDevice_ip
Normalized Schema validate-policy"]