22creation_date = " 2022/05/17"
33integration = [" kubernetes" ]
44maturity = " production"
5- updated_date = " 2025/01/15 "
5+ updated_date = " 2025/06/17 "
66
77[rule ]
88author = [" Elastic" ]
@@ -23,7 +23,7 @@ false_positives = [
2323 """ ,
2424]
2525index = [" logs-kubernetes.*" ]
26- language = " kuery "
26+ language = " eql "
2727license = " Elastic License v2"
2828name = " Kubernetes User Exec into Pod"
2929note = """ ## Triage and analysis
@@ -73,27 +73,22 @@ rule_id = "14de811c-d60f-11ec-9fd7-f661ea17fbce"
7373severity = " medium"
7474tags = [" Data Source: Kubernetes" , " Tactic: Execution" , " Resources: Investigation Guide" ]
7575timestamp_override = " event.ingested"
76- type = " query"
77-
76+ type = " eql"
7877query = '''
79- event.dataset : "kubernetes.audit_logs"
80- and kubernetes.audit.annotations.authorization_k8s_io/decision:"allow"
81- and kubernetes.audit.verb:"create"
82- and kubernetes.audit.objectRef.resource:"pods"
83- and kubernetes.audit.objectRef.subresource:"exec"
78+ any where host.os.type == "linux" and event.dataset == "kubernetes.audit_logs" and
79+ kubernetes.audit.verb in ("get", "create") and kubernetes.audit.objectRef.subresource == "exec" and
80+ kubernetes.audit.stage == "ResponseComplete" and `kubernetes.audit.annotations.authorization_k8s_io/decision` == "allow"
8481'''
8582
86-
8783[[rule .threat ]]
8884framework = " MITRE ATT&CK"
85+
8986[[rule .threat .technique ]]
9087id = " T1609"
9188name = " Container Administration Command"
9289reference = " https://attack.mitre.org/techniques/T1609/"
9390
94-
9591[rule .threat .tactic ]
9692id = " TA0002"
9793name = " Execution"
9894reference = " https://attack.mitre.org/tactics/TA0002/"
99-
0 commit comments