Access Application Credentials From Configmaps (kubernetes)
Platform | Author | Last Update |
---|---|---|
kubernetes | Leo Tsaousis | 2024-12-02 |
Attempt to Access Application Credentials by listing ConfigMaps
Despite this being a bad practice, Developers sometimes store secrets in the Kubernetes configuration files, such as environment variables in the pod configuration. Access to those configurations can be obtained by querying the API server.
This test case only simulates a standard “list” operation, although the same result can also be achieved with a “watch” operation. The associated detection shall therefore not be considered complete, but only a 1-to-1 match of this particular test case.
MITRE IDs
Scope
This test case does not need Cluster-wide permissions
Required Permissions
Required Parameters
None
Attacker Action
Detection Case
ELK query
When logs are ingested into ELK, the following query can be used to identify relevant events.