Skip to content

Commit 0c2abf5

Browse files
authored
Updated the policies (#1078)
Signed-off-by: Tejas-24ytj <tblamkhade24@gmail.com>
1 parent 37bf6e2 commit 0c2abf5

File tree

5 files changed

+5
-85
lines changed

5 files changed

+5
-85
lines changed

generic/csp/audit-temp-usage.yaml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,12 +3,12 @@ kind: KubeArmorClusterPolicy
33
metadata:
44
annotations:
55
app.accuknox.com/type: harden
6-
name: audit-tmp-usage
6+
name: audit-process-exec-in-tmp
77
spec:
88
action: Audit
99
severity: 3
1010
message: "Detected /tmp directory access"
11-
file:
11+
process:
1212
matchDirectories:
1313
- dir: /tmp/
1414
recursive: true

generic/csp/metadata.yaml

Lines changed: 1 addition & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -282,7 +282,7 @@ policyRules:
282282
hosts and local network devices, using port, vulnerability, or wordlist
283283
scans to identify potential attack surfaces.
284284
yaml: audit-pen-test-recon-tools.yaml
285-
- name: audit-temp-usage
285+
- name: audit-process-exec-in-tmp
286286
precondition:
287287
- OPTSCAN
288288
description:
@@ -308,28 +308,6 @@ policyRules:
308308
systems, including air-gapped networks, often using autorun or tricking
309309
users into executing malicious files.
310310
yaml: external-devices-connected.yaml
311-
- name: prevent-kubectl-cp
312-
precondition:
313-
- OPTSCAN
314-
description:
315-
refs:
316-
- name: MITRE_T1105
317-
url:
318-
- https://attack.mitre.org/techniques/T1105/
319-
tldr: Block kubectl cp for security
320-
detailed: Adversaries may transfer tools or other files from an external system into a compromised environment. Tools or files may be copied from an external adversary-controlled system to the victim network through the command and control channel or through alternate protocols such as ftp. Once present, adversaries may also transfer/spread tools between victim devices within a compromised environment
321-
yaml: prevent-kubectl-cp.yaml
322-
- name: prevent-shell-exec
323-
precondition:
324-
- OPTSCAN
325-
description:
326-
refs:
327-
- name: MITRE_T1059
328-
url:
329-
- https://attack.mitre.org/techniques/T1059/
330-
tldr: Prevent shell execution in kube-system namespace
331-
detailed: Adversaries may abuse command and script interpreters to execute commands, scripts, or binaries. These interfaces and languages provide ways of interacting with computer systems and are a common feature across many different platforms. Most systems come with some built-in command-line interface and scripting capabilities.
332-
yaml: prevent-shell-exec.yaml
333311
- name: env-preset
334312
precondition:
335313
- OPTSCAN

generic/csp/prevent-kubectl-cp.yaml

Lines changed: 0 additions & 24 deletions
This file was deleted.

generic/csp/prevent-shell-exec.yaml

Lines changed: 0 additions & 34 deletions
This file was deleted.

generic/csp/remote-file-copy.yaml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,8 +5,8 @@ metadata:
55
app.accuknox.com/type: harden
66
name: remote-file-copy
77
spec:
8-
action: Block
9-
message: "Blocked Remote file copy utility execution"
8+
action: Audit
9+
message: "Detected Remote file copy utility execution"
1010
process:
1111
matchPaths:
1212
- execname: scp

0 commit comments

Comments
 (0)