Detectionmediumtest

Azure Kubernetes Admission Controller

Identifies when an admission controller is executed in Azure Kubernetes. A Kubernetes Admission controller intercepts, and possibly modifies, requests to the Kubernetes API server. The behavior of this admission controller is determined by an admission webhook (MutatingAdmissionWebhook or ValidatingAdmissionWebhook) that the user deploys in the cluster. An adversary can use such webhooks as the MutatingAdmissionWebhook for obtaining persistence in the cluster. For example, attackers can intercept and modify the pod creation operations in the cluster and add their malicious container to every created pod. An adversary can use the webhook ValidatingAdmissionWebhook, which could be used to obtain access credentials. An adversary could use the webhook to intercept the requests to the API server, record secrets, and other sensitive information.

Convert In Phoenix Studio

Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.

Launch
Austin SongerCreated Thu Nov 25Updated Sun Dec 18a61a3c56-4ce2-4351-a079-88ae4cbd2b58cloud
Log Source
Azureactivitylogs
ProductAzure← raw: azure
Serviceactivitylogs← raw: activitylogs
Detection Logic
Detection Logic1 selector
detection:
    selection:
        operationName|startswith:
            - 'MICROSOFT.KUBERNETES/CONNECTEDCLUSTERS/ADMISSIONREGISTRATION.K8S.IO'
            - 'MICROSOFT.CONTAINERSERVICE/MANAGEDCLUSTERS/ADMISSIONREGISTRATION.K8S.IO'
        operationName|endswith:
            - '/MUTATINGWEBHOOKCONFIGURATIONS/WRITE'
            - '/VALIDATINGWEBHOOKCONFIGURATIONS/WRITE'
    condition: selection
False Positives

Azure Kubernetes Admissions Controller may be done by a system administrator.

If known behavior is causing false positives, it can be exempted from the rule.

Rule Metadata
Rule ID
a61a3c56-4ce2-4351-a079-88ae4cbd2b58
Status
test
Level
medium
Type
Detection
Created
Thu Nov 25
Modified
Sun Dec 18
Path
rules/cloud/azure/activity_logs/azure_kubernetes_admission_controller.yml
Raw Tags
attack.privilege-escalationattack.initial-accessattack.defense-evasionattack.persistenceattack.t1078attack.credential-accessattack.t1552attack.t1552.007
View on GitHub