Name:Kubernetes GCP detect sensitive role access id:a46923f6-36b9-4806-a681-31f314907c30 version:5 date:2024-11-14 author:Rod Soto, Splunk status:deprecated type:Hunting Description:This search provides information on Kubernetes accounts accessing sensitve objects such as configmpas or secrets Data_source:
how_to_implement:You must install splunk add on for GCP. This search works with pubsub messaging servicelogs. known_false_positives:Sensitive role resource access is necessary for cluster operation, however source IP, user agent, decision and reason may indicate possible malicious use. References: drilldown_searches:
: tags: analytic_story: - 'Kubernetes Sensitive Role Activity' asset_type:GCP GKE EKS Kubernetes cluster product: - 'Splunk Enterprise' - 'Splunk Enterprise Security' - 'Splunk Cloud' security_domain:threat