Access Secrets From Api Server (kubernetes)
Platform | Author | Last Update |
---|---|---|
kubernetes | Leo Tsaousis | 2024-12-02 |
Enumerate cluster secrets by querying the API server
This test case only simulates a standard “list” verb, although the same result can also be achieved with a “watch” operation. The associated detection shall therefore not be considered complete, but only a 1-to-1 match of this particular test case.
MITRE IDs
Scope
This test case does not need Cluster-wide permissions
Required Permissions
Required Parameters
None
Attacker Action
Detection Case
ELK query
When logs are ingested into ELK, the following query can be used to identify relevant events.