After its initial creation by Google in 2014, Kubernetes has become a de facto standard for container orchestration. In the Cloud Native Computing Foundations 2022 Annual report, 65% of end users reported to use Kubernetes in production environments, with another 25% evaluating to do the same. Given the popularity, it is no surprise that threat actors have taken note. The fluidness of orchestrated, containerized environments create a ripe environment for threat actors to find opportunities to gain footholds for their nefarious plans.
Recognizing this, the Azure Security team at Microsoft opted to develop a threat matrix for Kubernetes to identify threat actors’ tactics specifically targeting K8s environments. The Azure Security Team realized tactics used to gain access to an operating system are similar to that of a Kubernetes cluster:
OS Tactic |
Kubernetes Tactic |
Initial access |
Initial access to the cluster |
Malicious code on the computer |
Malicious code in a container |
Maintain access to the computer |
Maintain access to the cluster |
Escalate privileges on the computer |
Escalate privileges in the cluster |
Borrowing from MITRE’s ATT&CK Matrix, the Kubernetes Threat Matrix identifies different tactics and techniques along the different stages of the attack, presenting the multitude of attack paths available to a threat actor.
Four realizations occur from reviewing the Kubernetes Threat Matrix:
This puts Spyderbat in an ideal situation for Kubernetes runtime security. Spyderbat uniquely connects activities together based on their causal relationships. Spyderbat detects security concerns from either data or control planes with its detailed visibility into what actually occurs at runtime. Instead of alerting to each individual detection, Spyderbat flags activities that deviate from validated states or are known attack tactics. Sequences of activities, called Spydertraces, are evaluated based on their number of flags, flag severity, etc. in real-time. Spyderbat accurately identifies real emerging attacks when the Spydertrace hits a high risk score.
In subsequent blog posts, we will dissect individual attacks to illustrate how threat actors are infiltrating K8s environments and demonstrate how Spyderbat recognizes their individual tactics and how they are connected together.