Tagged articles
2 articles
Page 1 of 1
ITPUB
ITPUB
Apr 26, 2023 · Information Security

Detecting CDK Attacks with Kubernetes Audit Logs: Practical Rules and Pitfalls

This article explains how to enable Kubernetes audit logging, analyzes CDK‑based attack behaviors captured in audit logs, provides concrete detection rules for information collection, exploitation, and privilege escalation, and shares practical lessons learned when deploying audit‑driven security in cloud‑native environments.

CDKContainerKubernetes
0 likes · 18 min read
Detecting CDK Attacks with Kubernetes Audit Logs: Practical Rules and Pitfalls
Bilibili Tech
Bilibili Tech
Apr 18, 2023 · Cloud Native

Kubernetes Audit Log Analysis for Container Security

The article explains how to enable Kubernetes audit logging and use its detailed fields—such as userAgent, responseStatus, requestURI, and object references—to detect CDK‑generated attacks and other threats like CVE‑2022‑3172, privilege escalation, and backdoor deployment, offering practical detection examples and security recommendations.

API ServerAudit loggingCDK
0 likes · 15 min read
Kubernetes Audit Log Analysis for Container Security