Azure Kubernetes Pods Deleted
Identifies the deletion of Azure Kubernetes Pods. Adversaries may delete a Kubernetes pod to disrupt the normal behavior of the environment.
Elastic rule (View on GitHub)
1[metadata]
2creation_date = "2021/06/24"
3integration = ["azure"]
4maturity = "production"
5min_stack_comments = "New fields added: required_fields, related_integrations, setup"
6min_stack_version = "8.3.0"
7updated_date = "2023/06/22"
8
9[rule]
10author = ["Austin Songer"]
11description = """
12Identifies the deletion of Azure Kubernetes Pods. Adversaries may delete a Kubernetes pod to disrupt the normal behavior
13of the environment.
14"""
15false_positives = [
16 """
17 Pods may be deleted by a system administrator. Verify whether the user identity, user agent, and/or hostname should
18 be making changes in your environment. Pods deletions by unfamiliar users or hosts should be investigated. If known
19 behavior is causing false positives, it can be exempted from the rule.
20 """,
21]
22from = "now-25m"
23index = ["filebeat-*", "logs-azure*"]
24language = "kuery"
25license = "Elastic License v2"
26name = "Azure Kubernetes Pods Deleted"
27note = """## Setup
28
29The Azure Fleet integration, Filebeat module, or similarly structured data is required to be compatible with this rule."""
30references = [
31 "https://docs.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations#microsoftkubernetes",
32]
33risk_score = 47
34rule_id = "83a1931d-8136-46fc-b7b9-2db4f639e014"
35severity = "medium"
36tags = ["Domain: Cloud", "Data Source: Azure", "Use Case: Asset Visibility", "Tactic: Impact"]
37timestamp_override = "event.ingested"
38type = "query"
39
40query = '''
41event.dataset:azure.activitylogs and azure.activitylogs.operation_name:"MICROSOFT.KUBERNETES/CONNECTEDCLUSTERS/PODS/DELETE" and
42event.outcome:(Success or success)
43'''
44
45
46[[rule.threat]]
47framework = "MITRE ATT&CK"
48
49[rule.threat.tactic]
50id = "TA0040"
51name = "Impact"
52reference = "https://attack.mitre.org/tactics/TA0040/"
Setup
The Azure Fleet integration, Filebeat module, or similarly structured data is required to be compatible with this rule.
References
Related rules
- Azure Blob Container Access Level Modification
- Azure Resource Group Deletion
- Azure Service Principal Credentials Added
- Azure Virtual Network Device Modified or Deleted
- Azure AD Global Administrator Role Assigned