Loading

Kubernetes Anonymous User Bound to ClusterRole

Detects creation of a ClusterRoleBinding that assigns permissions to "system:anonymous" or "system:unauthenticated", effectively allowing unauthenticated access to Kubernetes resources and potentially enabling cluster compromise.

Rule type: query
Rule indices:

  • logs-kubernetes.audit_logs-*

Rule Severity: medium
Risk Score: 47
Runs every:
Searches indices from: ``
Maximum alerts per execution: 100
References:

Tags:

  • Data Source: Kubernetes
  • Domain: Kubernetes
  • Use Case: Threat Detection
  • Tactic: Persistence
  • Tactic: Privilege Escalation

Version: 1
Rule authors:

  • Elastic

Rule license: Elastic License v2

event.dataset:"kubernetes.audit_logs" and
kubernetes.audit.annotations.authorization_k8s_io/decision:"allow" and
kubernetes.audit.objectRef.resource:"clusterrolebindings" and
kubernetes.audit.verb:"create" and (
  kubernetes.audit.responseObject.subjects.name:("system:anonymous" or "system:unauthenticated") or
  kubernetes.audit.requestObject.subjects.name:("system:anonymous" or "system:unauthenticated")
)
		

Framework: MITRE ATT&CK

Framework: MITRE ATT&CK