Skip to main content

AWS principal granted access to many EKS clusters

ID:aws_eks_principal_granted_many
Data type:AWS CloudTrail
Severity:
Low
MITRE ATT&CK:TA0003:T1098.006

Description

AlphaSOC detected that an AWS principal was granted access to multiple Amazon EKS clusters. This may indicate an attempt by threat actors to establish persistent access to the AWS EKS environment.

Impact

Granting a single principal access to multiple EKS clusters increases the attack surface and potential impact of a compromise. If this principal is compromised, threat actors could gain unauthorized access to multiple Kubernetes environments, potentially exposing sensitive workloads, secrets, and data across different clusters, or causing service disruptions across the AWS EKS infrastructure.

Severity

SeverityCondition
Low
AWS principal granted access to many EKS clusters

Investigation and Remediation

Review AWS CloudTrail logs to identify the principal that was granted access to multiple EKS clusters and determine who initiated these changes. Verify the principal's legitimate need for multi-cluster access and whether this configuration was intended and authorized. If unauthorized, immediately revoke the excessive permissions, rotate any potentially compromised credentials, and implement least privilege access policies that limit principals to only the EKS clusters they require. Conduct a comprehensive security audit of your AWS environment to identify any other potential misconfigurations or indicators of compromise.