Skip to main content

Kubernetes resource created in service namespace

ID:k8s_resource_created_in_service_namespace
Data type:Kubernetes
Severity:
Low
MITRE ATT&CK:TA0003:T1543.005

Description

AlphaSOC detected the creation of an unauthorized pod in the kube-system namespace. This namespace contains essential Kubernetes components for cluster operations. Creating pods in this namespace can give adversaries persistent access and elevated privileges, making them appear as legitimate system services.

Impact

Unauthorized pods in the kube-system namespace pose a significant security risk to cluster operations. Threat actors can exploit these pods to execute commands with elevated privileges, access sensitive configuration data, and establish long-term persistence.

Severity

SeverityCondition
Low
Kubernetes resource created in service namespace

Investigation and Remediation

Review pod specifications, container images, and activity logs to determine if the creation was authorized. Look for suspicious network connections, file system access, or attempts at privilege escalation. Delete unauthorized pods and audit the security context of the remaining workloads. Review RBAC permissions and implement strict controls on the kube-system namespace.