-
Notifications
You must be signed in to change notification settings - Fork 594
[New Rule] Kubectl Secret Access #4834
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Conversation
Rule: New - GuidelinesThese guidelines serve as a reminder set of considerations when proposing a new rule. Documentation and Context
Rule Metadata Checks
New BBR Rules
Testing and Validation
|
⛔️ Test failed Results
|
⛔️ Test failed Results
|
This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Thank you for your contributions. |
This has been closed due to inactivity. If you feel this is an error, please re-open and include a justifying comment. |
⛔️ Test failed Results
|
Summary
This rule detects potential kubectl secret access activity by monitoring for process events where the kubectl command is executed with arguments that suggest an attempt to access Kubernetes secrets. This could indicate an adversary trying to gain unauthorized access to sensitive information stored in Kubernetes secrets.