how_to_implement:You must install splunk add on for GCP. This search works with pubsub messaging logs. known_false_positives:Kubectl calls are not malicious by nature. However source IP, source user, user agent, object path, and authorization context can reveal potential malicious activity, specially anonymous suspicious IPs and sensitive objects such as configmaps or secrets References: drilldown_searches:
: tags: analytic_story: - 'Kubernetes Sensitive Object Access Activity' asset_type:GCP GKE Kubernetes cluster product: - 'Splunk Enterprise' - 'Splunk Enterprise Security' - 'Splunk Cloud' security_domain:threat