Azure Kubernetes Pods Deleted

Identifies the deletion of Azure Kubernetes Pods. Adversaries may delete a Kubernetes pod to disrupt the normal behavior of the environment.

Elastic rule (View on GitHub)

 1[metadata]
 2creation_date = "2021/06/24"
 3integration = ["azure"]
 4maturity = "production"
 5min_stack_comments = "New fields added: required_fields, related_integrations, setup"
 6min_stack_version = "8.3.0"
 7updated_date = "2023/06/22"
 8
 9[rule]
10author = ["Austin Songer"]
11description = """
12Identifies the deletion of Azure Kubernetes Pods. Adversaries may delete a Kubernetes pod to disrupt the normal behavior
13of the environment.
14"""
15false_positives = [
16    """
17    Pods may be deleted by a system administrator. Verify whether the user identity, user agent, and/or hostname should
18    be making changes in your environment. Pods deletions by unfamiliar users or hosts should be investigated. If known
19    behavior is causing false positives, it can be exempted from the rule.
20    """,
21]
22from = "now-25m"
23index = ["filebeat-*", "logs-azure*"]
24language = "kuery"
25license = "Elastic License v2"
26name = "Azure Kubernetes Pods Deleted"
27note = """## Setup
28
29The Azure Fleet integration, Filebeat module, or similarly structured data is required to be compatible with this rule."""
30references = [
31    "https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations#microsoftkubernetes",
32]
33risk_score = 47
34rule_id = "83a1931d-8136-46fc-b7b9-2db4f639e014"
35severity = "medium"
36tags = ["Domain: Cloud", "Data Source: Azure", "Use Case: Asset Visibility", "Tactic: Impact"]
37timestamp_override = "event.ingested"
38type = "query"
39
40query = '''
41event.dataset:azure.activitylogs and azure.activitylogs.operation_name:"MICROSOFT.KUBERNETES/CONNECTEDCLUSTERS/PODS/DELETE" and
42event.outcome:(Success or success)
43'''
44
45
46[[rule.threat]]
47framework = "MITRE ATT&CK"
48
49[rule.threat.tactic]
50id = "TA0040"
51name = "Impact"
52reference = "https://attack.mitre.org/tactics/TA0040/"

Setup

The Azure Fleet integration, Filebeat module, or similarly structured data is required to be compatible with this rule.

References

Related rules

to-top