Skip to main content

Anonymous access unexpectedly granted to a Kubernetes cluster

ID:k8s_anonymous_access_granted_anomaly
Data type:Kubernetes
Severity:
Low
-
Medium
MITRE ATT&CK:TA0001:T1133

Description

AlphaSOC detected that anonymous access has been enabled on a Kubernetes cluster. This indicates that an authenticated account has modified the cluster's control plane configuration, allowing API calls to be made anonymously. Enabling anonymous access bypasses standard authentication mechanisms, posing a significant security risk by potentially exposing sensitive resources to unauthorized access.

Impact

Anonymous access to Kubernetes clusters allows adversaries to view, modify, or delete cluster resources without authentication. Threat actors can leverage this access to deploy unauthorized workloads, access sensitive resources, and exploit other parts of the infrastructure. This exposure creates opportunities for data breaches, resource hijacking, and service disruption.

Severity

SeverityCondition
Low
Anonymous access granted to a Kubernetes cluster
Medium
Unexpected anonymous access granted

Investigation and Remediation

Examine Kubernetes audit logs for unauthorized API requests and resource access. Review RBAC configurations and service account permissions. Implement strict authentication requirements for all API access. Deploy network policies to restrict cluster access. Revoke compromised service account tokens. Monitor for unauthorized resource creation or modification.