Skip to content

[New Rule] Kubernetes Suspicious Change to Privileges of Running Security Context #2302

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Conversation

imays11
Copy link
Contributor

@imays11 imays11 commented Sep 14, 2022

Issue

#2032

Summary

This rule detects when a user modifies a running pod/container to run in privileged mode or to run as root. A highly privileged container has access to the node's resources and breaks the isolation between containers. Processes in a privileged container are essentially equivalent to root on the host. If compromised, an attacker can use the privileged container to gain access to the underlying host. Gaining access to the host may provide the adversary with the opportunity to achieve follow-on objectives, such as establishing persistence, moving laterally within the environment, or setting up a command and control channel on the host.

…rity Context

## Issue
#2032

## Summary
This rule detects when a user modifies a running pod/container to run in privileged mode or to run as root. A highly
privileged container has access to the node's resources and breaks the isolation between containers. Processes in a
privileged container are essentially equivalent to root on the host. If compromised, an attacker can use the privileged
container to gain access to the underlying host. Gaining access to the host may provide the adversary with the
opportunity to achieve follow-on objectives, such as establishing persistence, moving laterally within the environment,
or setting up a command and control channel on the host.
@imays11 imays11 self-assigned this Sep 14, 2022
@imays11 imays11 added blocked OS: Linux Rule: New Proposal for new rule Integration: Kubernetes Kubernetes Integration v8.5.0 labels Sep 14, 2022
@brokensound77
Copy link
Contributor

@imays11 #4081 merged a few weeks ago, so is the block to wait for the changes to be reflected in the integration within prod?

@imays11
Copy link
Contributor Author

imays11 commented Sep 15, 2022

@imays11 #4081 merged a few weeks ago, so is the block to wait for the changes to be reflected in the integration within prod?

Yes that's exactly right, but the updated integration was released today so I'm removing the blocked tag

@imays11 imays11 removed the blocked label Sep 19, 2022
@imays11
Copy link
Contributor Author

imays11 commented Sep 19, 2022

Closing, testing revealed this behavior is not allowed by default.

@imays11 imays11 closed this Sep 19, 2022
@imays11 imays11 deleted the 2032-new-rule-kubernetes-suspicious-change-to-running-podcontainer-security-context branch September 19, 2022 17:19
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Integration: Kubernetes Kubernetes Integration OS: Linux Rule: New Proposal for new rule v8.5.0
Projects
None yet
Development

Successfully merging this pull request may close these issues.

[New Rule] Kubernetes Suspicious Change to Running Pod/Container Security Context
3 participants