Rule Library

Sigma Rules

10 rules found for "kelnage"

3,707Total
3,116Detection
451Emerging
137Hunting
Detectionmediumtest

Kubernetes Admission Controller Modification

Detects when a modification (create, update or replace) action is taken that affects mutating or validating webhook configurations, as they can be used by an adversary to achieve persistence or exfiltrate access credentials.

Kubernetesaudit
TA0004 · Privilege EscalationTA0001 · Initial AccessTA0005 · Defense EvasionTA0003 · Persistence+4
kelnageThu Jul 11application
Detectionmediumtest

Kubernetes CronJob/Job Modification

Detects when a Kubernetes CronJob or Job is created or modified. A Kubernetes Job creates one or more pods to accomplish a specific task, and a CronJob creates Jobs on a recurring schedule. An adversary can take advantage of this Kubernetes object to schedule Jobs to run containers that execute malicious code within a cluster, allowing them to achieve persistence.

Kubernetesaudit
TA0003 · PersistenceTA0004 · Privilege EscalationTA0002 · Execution
kelnageThu Jul 11application
Detectionmediumtest

Kubernetes Rolebinding Modification

Detects when a Kubernetes Rolebinding is created or modified.

Kubernetesaudit
TA0004 · Privilege Escalation
kelnageThu Jul 11application
Detectionmediumtest

Kubernetes Secrets Modified or Deleted

Detects when Kubernetes Secrets are Modified or Deleted.

Kubernetesaudit
TA0006 · Credential Access
kelnageThu Jul 11application
Detectionlowtest

Kubernetes Unauthorized or Unauthenticated Access

Detects when a request to the Kubernetes API is rejected due to lack of authorization or due to an expired authentication token being used. This may indicate an attacker attempting to leverage credentials they have obtained.

Kubernetesaudit
TA0004 · Privilege Escalation
kelnageFri Apr 12application
Detectionmediumtest

Okta Identity Provider Created

Detects when a new identity provider is created for Okta.

Oktaokta
TA0004 · Privilege EscalationTA0003 · PersistenceT1098.001 · Additional Cloud Credentials
kelnageThu Sep 07identity
Detectionhightest

Okta New Admin Console Behaviours

Detects when Okta identifies new activity in the Admin Console.

Oktaokta
TA0004 · Privilege EscalationTA0003 · PersistenceTA0005 · Defense EvasionTA0001 · Initial Access+1
kelnageThu Sep 07identity
Detectionhightest

Potential Okta Password in AlternateID Field

Detects when a user has potentially entered their password into the username field, which will cause the password to be retained in log files.

Oktaokta
TA0006 · Credential AccessT1552 · Unsecured Credentials
kelnageMon Apr 03identity
Detectionhightest

Okta Suspicious Activity Reported by End-user

Detects when an Okta end-user reports activity by their account as being potentially suspicious.

Oktaokta
TA0042 · Resource DevelopmentT1586.003 · Cloud Accounts
kelnageThu Sep 07identity
Detectionhightest

Okta User Session Start Via An Anonymising Proxy Service

Detects when an Okta user session starts where the user is behind an anonymising proxy service.

Oktaokta
TA0005 · Defense EvasionT1562.006 · Indicator Blocking
kelnageThu Sep 07identity