Detectionmediumtest
Kubernetes CronJob/Job Modification
Detects when a Kubernetes CronJob or Job is created or modified. A Kubernetes Job creates one or more pods to accomplish a specific task, and a CronJob creates Jobs on a recurring schedule. An adversary can take advantage of this Kubernetes object to schedule Jobs to run containers that execute malicious code within a cluster, allowing them to achieve persistence.
Convert In Phoenix Studio
Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.
Launch
Log Source
Kubernetesaudit
ProductKubernetes← raw: kubernetes
Serviceaudit← raw: audit
Detection Logic
Detection Logic1 selector
detection:
selection:
objectRef.apiGroup: 'batch'
objectRef.resource:
- 'cronjobs'
- 'jobs'
verb:
- 'create'
- 'delete'
- 'patch'
- 'replace'
- 'update'
condition: selectionFalse Positives
Modifying a Kubernetes Job or CronJob may need to be done by a system administrator.
Automated processes may need to take these actions and may need to be filtered.
MITRE ATT&CK
Rule Metadata
Rule ID
0c9b3bda-41a6-4442-9345-356ae86343dc
Status
test
Level
medium
Type
Detection
Created
Thu Jul 11
Author
Path
rules/application/kubernetes/audit/kubernetes_audit_cronjob_modification.yml
Raw Tags
attack.persistenceattack.privilege-escalationattack.execution