DeTT&CT(ing) Kubernetes ATT&CK(s) with Audit Logs

DeTT&CT(ing) Kubernetes ATT&CK(s) with Audit Logs

Subscribers:
23,600
Published on ● Video Link: https://www.youtube.com/watch?v=RwKbf8wqzpI



Category:
Vlog
Duration: 35:37
1,403 views
57


This presentation aims to discuss the different ways blue teamers can use to detect attacks and malicious behaviours on Kubernetes (K8s) clusters by leveraging the K8s audit logs and the new MITRE ATT&CK for Containers (and K8s). By deep-diving into a real-world attack scenario of a compromised cluster from one of our K8s honeypots, to demonstrate different ways defenders and incident responders can use to detect any malicious activity happening on their clusters. We will show how to enable audit logs and highlight which events are the most important from a security perspective. As K8s clusters can be very noisy, it is crucial to know where to look when there is an incident, as time is of the essence. Finally, we will demonstrate how to create dashboards and alerts around those logs on the SIEM of preference (Splunk, ELK, Datadog) so that you can quickly and easily act upon any suspicious activity on a cluster.

Magno Logan, Information Security Specialist, Trend Micro - twitter.com/magnologan

View upcoming Summits: http://www.sans.org/u/DuS
Download the presentation slides (SANS account required) at https://www.sans.org/u/1iaE
#BlueTeamSummit #Kubernetes







Tags:
sans institute
blue team
blue team operations
sans blue team summit
blue team summit
sans institute blue team summit
Magno Logan
Kubernetes
MITRE ATT&CK
Kubernetes tutorial
Kubernetes cluster
MITRE ATT&CK for containers
K8s
K8s audit logs