Skip to content

Hide Navigation Hide TOC

Pod Enumeration (07688e40-a7fa-4436-937f-1216674341a0)

Extracting a list of running or existing pods within a containerized cluster environment. Pods are the smallest deployable units in a Kubernetes cluster and typically represent an application or workload. Enumeration of pods provides insight into the structure and state of applications running in the cluster, such as the names of pods, their namespaces, and their associated metadata.

Data Collection Measures:

  • Kubernetes API Server Audit Logs:
    • Enable Audit Logging in Kubernetes to capture API requests, such as GET /api/v1/pods.
  • Container Runtime Logs:
    • Collect runtime-level logs from tools like CRI-O, containerd, or Docker, which might show relevant API calls for pod enumeration.
  • EDR and SIEM:
    • Endpoint Detection and Response (EDR) tools, if configured with cluster-level visibility, can monitor user commands like kubectl get pods.
    • SIEM platforms (e.g., Splunk) can ingest Kubernetes API logs to detect enumeration patterns.
  • Host-Based Monitoring:
    • Monitor processes and commands executed on nodes where kubectl is installed using tools like auditd, Sysmon for Linux, or kernel modules.
Cluster A Galaxy A Cluster B Galaxy B Level
Container and Resource Discovery - T1613 (0470e792-32f8-46b0-a351-652bc35e9336) Attack Pattern Pod Enumeration (07688e40-a7fa-4436-937f-1216674341a0) mitre-data-component 1