Skip to main content

Suspicious GCP API calls indicating GKE intra-node visibility modification

ID:gcp_gke_intranode_visibility_disabled_suspicious
Data type:Google Cloud Platform
Severity:
Informational
-
Medium
MITRE ATT&CK:TA0005:T1562

Description

AlphaSOC detected that intra-node visibility was disabled on a GKE cluster via google.container.v1beta1.ClusterManager.UpdateCluster. Intra-node visibility enables network flow logging between pods on the same node, providing visibility into pod-to-pod communication that would otherwise be invisible to VPC flow logs.

Adversaries may disable intra-node visibility to reduce monitoring coverage and hide lateral movement between pods on the same node.

Impact

Disabling intra-node visibility removes visibility into network traffic between pods on the same node. This can hide malicious lateral movement, data exfiltration between pods, or communication with compromised containers. Security teams lose the ability to detect suspicious pod-to-pod traffic patterns.

Severity

SeverityCondition
Informational
Unexpected action, ASN, user agent or region
Low
Two unexpected properties at the same time
Medium
Three unexpected properties at the same time

Investigation and Remediation

Review GCP audit logs for the UpdateCluster action with desiredIntraNodeVisibilityConfig changes. Identify the principal that disabled intra-node visibility and verify if this was an authorized change.

If unauthorized, re-enable intra-node visibility on the cluster. Investigate the compromised identity for additional defense evasion activities. Review pod network policies and consider implementing additional monitoring for suspicious container behavior.