Skip to main content

Kubernetes API calls indicating namespace creation

ID:k8s_namespace_created
Data type:Kubernetes
Severity:
Informational
-
Medium
MITRE ATT&CK:TA0005:T1562

Description

AlphaSOC detected the creation of a new Kubernetes namespace. Namespaces provide logical isolation within clusters and are commonly used for organizing workloads. While namespace creation is a normal administrative operation, threat actors may create namespaces to isolate malicious activities, maintain persistence, or evade detection by operating outside monitored areas.

Impact

Unauthorized namespace creation may enable threat actors to deploy workloads that could evade security monitoring. This separation could potentially allow malicious activities to operate with reduced visibility, which may facilitate data exfiltration, cryptocurrency mining, or lateral movement within the cluster.

Severity

SeverityCondition
Informational
Unexpected action, ASN, user agent, or namespace
Low
Two unexpected properties at the same time
Medium
Three unexpected properties at the same time

Investigation and Remediation

Review Kubernetes audit logs to identify the user or service account that created the namespace and verify the legitimacy of the action. Examine the namespace configuration, any associated resources, and deployed workloads. If the namespace creation was unauthorized or unnecessary, remove the namespace and its resources. Review and update RBAC policies to ensure namespace creation privileges follow the principle of least privilege.