Skip to content

Conversation

@imays11
Copy link
Contributor

@imays11 imays11 commented Sep 13, 2022

Issue

#2038

Summary

This rule detects when an unauthenticated user request is authorized within the cluster. Attackers may attempt to use anonymous accounts to gain initial access to the cluster or to avoid attribution of their activities within the cluster. This rule excludes the /healthz, /livez and /readyz endpoints which are commonly accessed anonymously.

Details

image
image

## Issue #2038 ## Summary This rule detects when an unauthenticated user request is authorized within the cluster. Attackers may attempt to use anonymous accounts to gain initial access to the cluster or to avoid attribution of their activities within the cluster. This rule excludes the /healthz, /livez and /readyz endpoints which are commonly accessed anonymously.
@imays11 imays11 added blocked OS: Linux Rule: New Proposal for new rule Integration: Kubernetes Kubernetes Integration v8.5.0 labels Sep 13, 2022
@imays11 imays11 self-assigned this Sep 13, 2022
@imays11 imays11 linked an issue Sep 13, 2022 that may be closed by this pull request
Copy link
Contributor

@DefSecSentinel DefSecSentinel left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM

Co-authored-by: shashank-elastic <91139415+shashank-elastic@users.noreply.github.com>
@DefSecSentinel DefSecSentinel merged commit fa0310d into main Sep 19, 2022
@DefSecSentinel DefSecSentinel deleted the 2038-new-rule-kubernetes-anonymous-access-allowed branch September 19, 2022 16:33
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

Integration: Kubernetes Kubernetes Integration OS: Linux Rule: New Proposal for new rule v8.5.0

4 participants