Skip to content

Commit d68c3e1

Browse files
authored
Merge pull request #176543 from memildin/asc-melvyn-release-notes
RN for two new K8s alerts
2 parents 5924f95 + 5cc3dd1 commit d68c3e1

File tree

1 file changed

+16
-1
lines changed

1 file changed

+16
-1
lines changed

articles/security-center/release-notes.md

Lines changed: 16 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: memildin
55
manager: rkarlin
66
ms.service: security-center
77
ms.topic: reference
8-
ms.date: 10/17/2021
8+
ms.date: 10/20/2021
99
ms.author: memildin
1010

1111
---
@@ -31,6 +31,7 @@ Updates in October include:
3131
- [Software inventory filters added to asset inventory (in preview)](#software-inventory-filters-added-to-asset-inventory-in-preview)
3232
- [Changed prefix of some alert types from "ARM_" to "VM_"](#changed-prefix-of-some-alert-types-from-arm_-to-vm_)
3333
- [Recommendations details pages now show related recommendations](#recommendations-details-pages-now-show-related-recommendations)
34+
- [New alerts for Azure Defender for Kubernetes (in preview)](#new-alerts-for-azure-defender-for-kubernetes-in-preview)
3435

3536

3637
### Microsoft Threat and Vulnerability Management added as vulnerability assessment solution (in preview)
@@ -143,6 +144,20 @@ Therefore:
143144

144145

145146

147+
### New alerts for Azure Defender for Kubernetes (in preview)
148+
149+
To expand the threat protections provided by Azure Defender for Kubernetes, we've added two preview alerts.
150+
151+
These alerts are generated based on a new machine learning model and Kubernetes advanced analytics, measuring multiple deployment and role assignment attributes against previous activities in the cluster and across all clusters monitored by Azure Defender.
152+
153+
| Alert (alert type) | Description | MITRE tactic | Severity |
154+
|------------------------------------------------------------------------------------|------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|:--------------------------------------------:|----------|
155+
| **Anomalous pod deployment (Preview)**<br>(K8S_AnomalousPodDeployment) | Kubernetes audit log analysis detected pod deployment which is anomalous based on previous pod deployment activity. This activity is considered an anomaly when taking into account how the different features seen in the deployment operation are in relations to one another. The features monitored by this analytics include the container image registry used, the account performing the deployment, day of the week, how often does this account performs pod deployments, user agent used in the operation, is this a namespace which is pod deployment occur to often, or other feature. Top contributing reasons for raising this alert as anomalous activity are detailed under the alert extended properties. | Execution | Medium |
156+
| **Excessive role permissions assigned in Kubernetes cluster (Preview)**<br>(K8S_ServiceAcountPermissionAnomaly) | Analysis of the Kubernetes audit logs detected an excessive permissions role assignment to your cluster. From examining role assignments, the listed permissions are uncommon to the specific service account. This detection considers previous role assignments to the same service account across clusters monitored by Azure, volume per permission, and the impact of the specific permission. The anomaly detection model used for this alert takes into account how this permission is used across all clusters monitored by Azure Defender. | Privilege Escalation | Low |
157+
|||
158+
159+
For a full list of the Kubernetes alerts, see [Alerts for Kubernetes clusters](alerts-reference.md#alerts-k8scluster).
160+
146161
## September 2021
147162

148163
In September, the following update was released:

0 commit comments

Comments
 (0)