Detectionlowtest

New Kubernetes Service Account Created

Detects creation of new Kubernetes service account, which could indicate an attacker's attempt to persist within a cluster.

Convert In Phoenix Studio

Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.

Launch
Leo TsaousisCreated Tue Mar 26e31bae15-83ed-473e-bf31-faf4f8a17d36application
Log Source
Kubernetesapplicationaudit
ProductKubernetes← raw: kubernetes
Categoryapplication← raw: application
Serviceaudit← raw: audit
Detection Logic
Detection Logic1 selector
detection:
    selection:
        verb: 'create'
        objectRef.resource: 'serviceaccounts'
    condition: selection
False Positives
Unknown

False positive likelihood has not been assessed. Additional context may be needed during triage.

Rule Metadata
Rule ID
e31bae15-83ed-473e-bf31-faf4f8a17d36
Status
test
Level
low
Type
Detection
Created
Tue Mar 26
Path
rules/application/kubernetes/audit/kubernetes_audit_serviceaccount_creation.yml
Raw Tags
attack.persistenceattack.t1136
View on GitHub