Kubernetes Multi-Resource Discovery

Last updated 11 days ago on 2026-04-22
Created 11 days ago on 2026-04-22

About

Adversaries who land credentials in a cluster—or abuse an over-privileged token—often map the environment before exfiltration or privilege escalation. A practical first pass is to learn where workloads run, how the cluster is partitioned, and what RBAC exists at namespace vs cluster scope. Rapid `get`/`list` traffic across distinct API resource kinds that answer those questions (namespaces, workloads, roles, cluster-wide roles) is a common setup and orientation pattern for both interactive attackers and automated recon scripts. It is less typical for steady-state controllers, which usually touch a narrow set of resources repeatedly. This rule highlights that cross-resource burst from a single client fingerprint within a one-minute bucket so analysts can separate routine automation from potential discovery and permission reconnaissance ahead of follow-on actions.
Tags
Data Source: KubernetesDomain: KubernetesUse Case: Threat DetectionTactic: DiscoveryLanguage: esql
Severity
medium
Risk Score
47
MITRE ATT&CK™

Discovery (TA0007)(external, opens in a new tab or window)

License
Elastic License v2(external, opens in a new tab or window)

Definition

Integration Pack
Prebuilt Security Detection Rules
Related Integrations

kubernetes(external, opens in a new tab or window)

Query
text code block:
from logs-kubernetes.audit_logs-* metadata _id, _index, _version | eval Esql.time_interval = date_trunc(1 minute, @timestamp) | where event.dataset == "kubernetes.audit_logs" and event.action in ("get", "list") and kubernetes.audit.objectRef.resource in ("namespaces", "nodes", "pods", "roles", "configmaps", "serviceaccounts", "clusterroles", "clusterrolebindings", "rolebindings") and source.ip is not null and user.name IS NOT NULL and not to_string(source.ip) in ("127.0.0.1", "::1") and not user.name rlike """(system:serviceaccount:kube-system:|eks:|system:kube-|arn:aws:sts::.*:assumed-role/AWSServiceRoleForAmazonEKS/|system:serviceaccount:kube-system:azure|system:node:aks-default|aksService).*""" | stats Esql.unique_resources = count_distinct(kubernetes.audit.objectRef.resource), Esql.enumerated_resources = values(kubernetes.audit.objectRef.resource), Esql.enumerated_namespaces = values(kubernetes.audit.objectRef.namespace), Esql.decisions = values(`kubernetes.audit.annotations.authorization_k8s_io/decision`) by user.name, source.ip, user_agent.original, Esql.time_interval | where Esql.unique_resources >= 3 | keep Esql.*, user.name, source.ip, user_agent.original

Install detection rules in Elastic Security

Detect Kubernetes Multi-Resource Discovery in the Elastic Security detection engine by installing this rule into your Elastic Stack.

To setup this rule, check out the installation guide for Prebuilt Security Detection Rules(external, opens in a new tab or window).