Credential Access (TA0006)(external, opens in a new tab or window)
text code block:event.dataset:"kubernetes.audit_logs" and event.action:list and kubernetes.audit.objectRef.resource:secrets and kubernetes.audit.requestURI :(/api/v1/secrets or /api/v1/secrets?limit* or /api/v1/namespaces/kube-system/secrets or /api/v1/namespaces/kube-system/secrets?limit* or /api/v1/namespaces/default/secrets or /api/v1/namespaces/default/secrets?limit*) and source.ip:(* and not ("::1" or "127.0.0.1")) and not user.name: (system\:kube-controller-manager or eks\:cloud-controller-manager or eks\:kms-storage-migrator)
Install detection rules in Elastic Security
Detect Kubernetes Secrets List Across Cluster or Sensitive Namespaces in the Elastic Security detection engine by installing this rule into your Elastic Stack.
To setup this rule, check out the installation guide for Prebuilt Security Detection Rules(external, opens in a new tab or window).