awesome-kubernetes-threat-detection

Threat detection guide

A curated list of resources about detecting threats and defending Kubernetes systems.

A curated list of resources about detecting threats and defending Kubernetes systems.

GitHub

368 stars
11 watching
33 forks
last commit: over 1 year ago
Linked from 2 awesome lists


Contents / Books

Hacking Kubernetes By Andrew Martin, Michael Hausenblas [ ] [ ]
Kubernetes Security and Observability by Brendan Creane, Amit Gupta [ ]
Security Observability with eBPF by Jed Salazar and Natalia Reka Ivanko
amazon Gray Hat Hacking, 6th Ed. (relevant chapters) By Allen Harper, Ryan Linn, Stephen Sims, Michael Baucom, Huascar Tejeda, Daniel Fernandez, Moses Frost [ ]

Contents / Books / amazon

Ch 29. Hacking on Containers [ ]
Ch 30. Hacking on Kubernetes [ ]

Contents / Books

Kubernetes Patterns, 2nd Edition, Part 5: Security Patterns by Bilgin Ibryam and Roland Huss [ ]
Container Security Book by Liz Rice [ ]

Contents / Conferences

2022 eBPF Summit [ ] [ ] [ ]
CloudNative SecurityCon

Contents / Talks and videos / Detection

Keynote: Detecting Threats in GitHub with Falco
Threat Hunting at Scale: Auditing Thousands of Clusters With Falco
Security Kill Chain Stages in a 100k+ Daily Container Environment with Falco
Falco to Pluginfinity and Beyond
Purple Teaming Like Sky’s the Limit – Adversary Emulation in the Cloud
Uncovering a Sophisticated Kubernetes Attack in Real Time Part II.
Keeping your cluster safe from attacks with eBPF
Threat Modeling Kubernetes: A Lightspeed Introduction

Contents / Talks and videos / Hardening

Securing Kubernetes Applications by Crafting Custom Seccomp Profiles
The Hitchhiker's Guide to Pod Security
You and Your Security Profiles; Generating Security Policies with the Help of eBPF
Using the EBPF Superpowers To Generate Kubernetes Security Policies
Komrade: an Open-Source Security Chaos Engineering (SCE) Tool for

Contents / Talks and videos / Attacks

Advanced Persistence Threats: The Future of Kubernetes Attacks
Bypassing Falco: How to Compromise a Cluster without Tripping the SOC
A Treasure Map of Hacking (and Defending) Kubernetes
How Attackers Use Exposed Prometheus Server to Exploit
Trampoline Pods: Node to Admin PrivEsc Built Into Popular K8s Plat
Three Surprising K8s Networking “Features” and How to Defend Against Them
A Compendium of Container Escapes
The Path Less Traveled: Abusing Kubernetes Defaults

Contents / Talks and videos / Supply Chain

Securing Your Container Native Supply Chain with SLSA, Github and Te
Keynote: Securing Shopify's Software Supply Chain - Shane Lawrence, Shopify

Contents / Talks and videos / Networking

Kubernetes Networking 101 (1h26m)
A Guided Tour of Cilium Service Mesh
Cilium: Welcome, Vision and Updates
Cloud-Native Building Blocks: An Interactive Envoy Proxy Workshop (1h25m)

Contents / Blogs and Articles / Detection

Detecting a Container Escape with Cilium and eBPF
Detecting and Blocking log4shell with Isovalent Cilium Enterprise
Threat Hunting with Kubernetes Audit Logs
Threat Hunting with Kubernetes Audit Logs - Part 2
Lateral movement risks in the cloud and how to prevent them – Part 2: from compromised container to cloud takeover
Lateral movement risks in the cloud and how to prevent them – Part 3: from compromised cloud resource to Kubernetes cluster takeover
Dive into BPF: a list of reading material
Deep Dive into Real-World Kubernetes Threats
Understanding Docker container escapes
Consider All Microservices Vulnerable — And Monitor Their Behavior
K8 Audit Logs
Kubernetes Hunting & Visibility
SCARLETEEL: Operation leveraging Terraform, Kubernetes, and AWS for data theft
Detecting Cryptomining Attacks in the wild
Threat Alert: Kinsing Malware Attacks Targeting Container Environments
TeamTNT Actively Enumerating Cloud Environments to Infiltrate Organizations
TeamTNT Targeting AWS, Alibaba
Hildegard: New TeamTNT Cryptojacking Malware Targeting Kubernetes
Siloscape: First Known Malware Targeting Windows Containers to Compromise Cloud Environments
CrowdStrike Discovers First-Ever Dero Cryptojacking Campaign Targeting Kubernetes

Contents / Blogs and Articles / Hardening

NSA Kubernetes Hardening Guide
Securing Kubernetes Clusters by Eliminating Risky Permissions
Container security fundamentals: Exploring containers as processes
Container security fundamentals part 2: Isolation & namespaces
Kubernetes Security Checklist
Under-documented Kubernetes Security Tips

Contents / Blogs and Articles / Attacks

Attacker persistence in Kubernetes using the TokenRequest API: Overview, detection, and prevention
Tetragone: A Lesson in Security Fundamentals
How I Hacked Play-with-Docker and Remotely Ran Code on the Host
The Route to Root: Container Escape Using Kernel Exploitation
(twitter thread)Quick and dirty way to get out of a privileged k8s pod or docker container by using cgroups release_agent feature.
Bad Pods: Kubernetes Pod Privilege Escalation [ ]
Kernel privilege escalation: how Kubernetes container isolation impacts privilege escalation attacks
GKE Kubelet TLS Bootstrap Privilege Escalation

Contents / TTPs / Attack Matrices

MITRE ATT&CK Containers Matrix
Threat matrix for Kubernetes
Secure containerized environments with updated threat matrix for Kubernetes
OWASP Kubernetes Top 10
OWASP Kubernetes Top 10 (Sysdig)
AVOLENS Kubernetes Threat Matrix

Contents / Tools / Detection

falco 7,460 7 days ago
kube-bench 7,129 6 days ago
kubesec 1,255 2 days ago
security-guard 65 20 days ago
sysdig 7,812 8 days ago
tetragon 3,694 1 day ago
tracee 3,657 4 days ago
trivy 24,010 5 days ago

Contents / Tools / Hardening

seccomp "can be used to sandbox the privileges of a process, restricting the calls it is able to make from userspace into the kernel."
AppArmor "AppArmor is a Linux kernel security module that supplements the standard Linux user and group based permissions to confine programs to a limited set of resources. AppArmor can be configured for any application to reduce its potential attack surface and provide greater in-depth defense."
Kubernetes Network Policy Recipes 5,759 9 months ago
OPA Gatekeeper 3,743 about 24 hours ago "A customizable cloud native policy controller that helps enforce policies and strengthen governance"

Contents / Tools / Simulation / Experimentation

Stratus Red Team 1,863 6 days ago Stratus Red Team is "Atomic Red Team™" for the cloud, allowing to emulate offensive attack techniques in a granular and self-contained manner

Contents / Tools / Simulation / Experimentation / Stratus Red Team

Kubernetes Attacks 1,863 6 days ago see

Contents / Tools / Simulation / Experimentation

falcosecurity/event-generator 97 8 days ago
minikube 29,636 4 days ago minikube implements a local Kubernetes cluster on macOS, Linux, and Windows. minikube's primary goals are to be the best tool for local Kubernetes application development and to support all Kubernetes features that fit
controlplaneio/simulator 937 4 months ago
kubernetes-goat 4,542 10 days ago
Sock Shop: A Microservices Demo Application

Contents / Tools / Attack

kubesploit 1,130 5 months ago
Falco-bypasses 79 11 months ago
go-pillage-registries 104 almost 5 years ago
ConMachi 106 about 6 years ago
peirates 1,253 2 months ago
botb 654 about 1 year ago
kubernetes-info.nse script
kube-hunter 4,774 9 months ago
MTKPI 217 4 months ago

Contents / Tools / Platforms

m9sweeper 251 5 months ago "m9sweeper is a free and easy kubernetes security platform. It integrates industry-standard open source utilities into a one-stop-shop kubernetes security tool that can walk most kubernetes adminstrators through securing a kubernetes cluster as well as the apps running on the cluster."
anchore "Software Composition Analysis from Code to Cloud: Enables security teams to find every piece of software in cloud native applications. Block and fix security issues in minutes rather than days."
Prisma Cloud Compute Edition (formerly Twistlock) "Prisma Cloud secures applications from code to cloud, enabling security and DevOps teams to effectively collaborate to accelerate secure cloud-native application development and deployment."
sysdig "Sysdig is a universal system visibility tool with native support for containers"
Aqua Security "Unified Cloud Security: Accelerate secure innovation and protect your entire development lifecycle from code to cloud and back."

Contents / Tools / Misc

kube-iptables-tailer 552 4 months ago
inspektor-gadget 2,292 about 19 hours ago

Contents / Detection Rules and Analytics

Elastic kubernetes detection rules 1,990 5 days ago
Falco Rules 99 about 2 months ago
Panther Labs gcp_k8s_rules 346 about 18 hours ago
Sigma cloud/azure/kube*.yml 8,490 1 day ago
Sigma cloud/gcp/kube*.yml 8,490 1 day ago
Splunk Analytic Story: Kubernetes Scanning Activity
Splunk Analytic Story: Kubernetes Sensitive Object Access Activity
Tracee Signatures 3,657 4 days ago

Contents / Detection Rules and Analytics / Projectdiscovery/nuclei-templates

technologies/kubernetes 9,457 about 14 hours ago
exposed-panels/kube*.yaml 9,457 about 14 hours ago
misconfiguration/kubernetes 9,457 about 14 hours ago
exposures/configs/kube*.yaml 9,457 about 14 hours ago

Contents / People

@_fel1x
@Antonlovesdnb
@bibryam
@bradgeesaman
@christophetd
@g3rzi
@htejeda
@iancoldwater
@jrfastab
@LachlanEvenson
@lizrice
@mhausenblas
@mhausenblas
@mosesrenegade
@nataliaivanko
@raesene
@ramesh-ramani
@randyabernethy
@saschagrunert
@sethsec
@shaul-ben-hai
@sshaybbc
@Steph3nSims
@sublimino
@sussurro
@sys_call
@tgraf__
@tixxdz
@tpapagian
@willfindlay
@yuvalavra
@jimmesta

Backlinks from these awesome lists:

More related projects: