The fifth installment in our nine-part blog series – where we examine each of the nine MITRE ATT&CK tactics and techniques for Kubernetes – covers Defense Evasion, a grouping of techniques focused on concealing adversary actions intended to avoid detection. This includes tactics such as deleting evidence of an attacker’s presence or obfuscating how access to a resource was gained. You can find the first four articles in the series below:
- Part one - Initial Access
- Part two - Execution
- Part three - Persistence
- Part four - Privilege Escalation
- Part six - Credential Access
- Part seven - Discovery
- Part eight - Lateral Movement
- Part nine - Impact
StackRox helps mitigate these Defense Evasion threats by monitoring all pods, including those not created by using a Kubernetes controller, and identifying standalone pods directly in the StackRox user interface.
Technique 5.1: Clear container logs
Issue
With this technique, an attacker may delete logs from the container runtime or operating system that capture the attacker’s activity within containers.
Best Practice for Mitigation
Primary areas to configure security controls: Kubernetes, Cloud Provider, and Other - container runtime and operating system
Kubernetes
Within Kubernetes, organizations can mitigate this threat by minimizing container access to nodes by restricting host mounts (also see Techniques 3.2 “Writable hostPath mount” and 4.3 “hostPath mount” for reference).
Cloud Provider
Within the cloud provider environment, organizations should minimize access to cluster nodes to mitigate this threat.
Other - Container runtime and operating system
Organizations should continuously send collected logs from the container runtime and operating system to a secure, external logging service, security information and event management (SIEM) system, or persistent storage.
Technique 5.2: Delete Kubernetes events
Issue
Another technique an attacker may use to avoid detection is to delete Kubernetes audit logs, which provide a chronological record of security-relevant activities taken by users or system components within a Kubernetes cluster.
Best Practice for Mitigation
Primary areas to configure security controls: Kubernetes and Cloud Provider
Kubernetes
Organizations should configure Kubernetes audit logging to continuously send events to an external logging service outside clusters. Additionally, administrators should minimize container access to underlying nodes, especially in the Kubernetes control plane, by restricting host mounts (also see Techniques 3.2 “Writable hostPath mount” and 4.3 “hostPath mount” for reference).
Cloud Provider
If running clusters using a cloud provider-managed Kubernetes service, organizations should use activity logging feature available. Administrators should also further minimize user access to underlying nodes.
Technique 5.3: Pod / container name similarity
Issue
This threat arises from the possibility that pods created by controllers such as Deployments or DaemonSets may have a random suffix in their names. An attacker could use a random suffix to obfuscate the presence of an unauthorized pod within the cluster that could be used to execute malicious code or gain access to additional resources.
Best Practice for Mitigation
Primary area to configure security controls: Kubernetes
Administrators should mitigate the risk of this threat by following the principle of least privilege with regard to access control and limiting RBAC permissions on pod creation APIs.
How StackRox Helps
StackRox helps protect against this attack technique by monitoring all pods, including those not created by using a Kubernetes controller. StackRox also identifies standalone pods (those not created by a controller) in its platform.
Technique 5.4: Connect from Proxy server
Issue
To conceal their network origin, attackers may employ this technique by using proxy servers or anonymous networks to hide their IP address.
Best Practice for Mitigation
Primary area to configure security controls: Cloud Provider
Organizations can mitigate this threat by configuring controls within the cloud provider such as applying network access restrictions to the Kubernetes API server using managed Kubernetes service controls, if applicable, or cloud network firewall rules. Note that these practices can also mitigate Kubernetes API server vulnerabilities or misconfigurations such as CVE-2018-1002105.
저자 소개
Wei Lien Dang is Senior Director of Product and Marketing for Red Hat Advanced Cluster Security for Kubernetes. He was a co-founder at StackRox, which was acquired by Red Hat. Before his time at StackRox, Dang was Head of Product at CoreOS and held senior product management roles for security and cloud infrastructure at Amazon Web Services, Splunk, and Bracket Computing. He was also part of the investment team at the venture capital firm Andreessen Horowitz.
Dang holds an MBA with high distinction from Harvard Business School and a BS in Applied Physics with honors from Caltech.
채널별 검색
오토메이션
기술, 팀, 인프라를 위한 IT 자동화 최신 동향
인공지능
고객이 어디서나 AI 워크로드를 실행할 수 있도록 지원하는 플랫폼 업데이트
오픈 하이브리드 클라우드
하이브리드 클라우드로 더욱 유연한 미래를 구축하는 방법을 알아보세요
보안
환경과 기술 전반에 걸쳐 리스크를 감소하는 방법에 대한 최신 정보
엣지 컴퓨팅
엣지에서의 운영을 단순화하는 플랫폼 업데이트
인프라
세계적으로 인정받은 기업용 Linux 플랫폼에 대한 최신 정보
애플리케이션
복잡한 애플리케이션에 대한 솔루션 더 보기
오리지널 쇼
엔터프라이즈 기술 분야의 제작자와 리더가 전하는 흥미로운 스토리
제품
- Red Hat Enterprise Linux
- Red Hat OpenShift Enterprise
- Red Hat Ansible Automation Platform
- 클라우드 서비스
- 모든 제품 보기
툴
체험, 구매 & 영업
커뮤니케이션
Red Hat 소개
Red Hat은 Linux, 클라우드, 컨테이너, 쿠버네티스 등을 포함한 글로벌 엔터프라이즈 오픈소스 솔루션 공급업체입니다. Red Hat은 코어 데이터센터에서 네트워크 엣지에 이르기까지 다양한 플랫폼과 환경에서 기업의 업무 편의성을 높여 주는 강화된 기능의 솔루션을 제공합니다.