Delete Service Account (kubernetes)
Platform | Author | Last Update |
---|---|---|
kubernetes | Leo Tsaousis | 2024-12-02 |
Delete a Kubernetes service account
MITRE IDs
Scope
This test case does not need Cluster-wide permissions
Required Permissions
- apiGroups: - '' namespaced: true resources: - serviceaccounts verbs: - delete
Required Parameters
Name | Type | Description | Example Value |
---|---|---|---|
serviceaccount | str | Name of the service account to delete | leonidas-created-service |
Attacker Action
kubectl delete serviceaccount leonidas-created-service
Detection Case
ELK query
When logs are ingested into ELK, the following query can be used to identify relevant events.
verb:delete AND resource:serviceaccounts
Sigma Definition
---title: Delete service accountid: 00d40e2c-a605-4ea5-8efd-af0e8386cbeastatus: experimentalauthor: Leo Tsaousisdate: 2024-12-02description: | Delete a Kubernetes service accountlogsource: product: kubernetes service: auditdetection: selection: verb: delete
resource: serviceaccounts
condition: selectionlevel: lowtags:- attack.1531references:- https://microsoft.github.io/Threat-Matrix-for-Kubernetes/techniques/Data%20destruction/