Skip to main content

Multiple denied Kubernetes API calls requiring investigation

ID:k8s_access_denied
Data type:Kubernetes
Severity:
Low
MITRE ATT&CK:TA0007:T1613

Description

AlphaSOC detected multiple Kubernetes API calls denied with 401 (Unauthorized) or 403 (Forbidden) responses. These access denials may indicate reconnaissance or privilege escalation attempts targeting the Kubernetes control plane, but could also result from misconfiguration or expired credentials.

Impact

API access denials can reveal misconfigurations in RBAC policies and service account permissions. Adversaries may use this information to identify potential access paths and attempt privilege escalation. If successful in bypassing access controls, threat actors could potentially deploy workloads, access secrets, and move laterally within the cluster.

Severity

SeverityCondition
Low
Multiple denied Kubernetes API calls requiring investigation

Investigation and Remediation

Review Kubernetes audit logs to identify the source of the denied requests, including usernames, service accounts, and targeted resources. Analyze RBAC policies and service account permissions for misconfigurations or overly permissive settings. Update RBAC policies based on the principle of least privilege. Investigate potential compromised credentials or exposed service account tokens. Consider enabling more detailed audit logging for API server access attempts and implementing network policies to restrict unnecessary pod-to-pod and external communications.

Known False Positives

  • Misconfigured applications attempting legitimate API access
  • Helm chart installations with incorrect RBAC settings