AWS EKS Control Plane Logging Disabled
This rule detects successful Amazon EKS UpdateClusterConfig requests that disable control plane logging, potentially indicating defense evasion via compromised AWS credentials or unauthorized administrative access that reduces visibility into cluster activity.
This detection identifies instances where Amazon Elastic Kubernetes Service (EKS) control plane logging is disabled via the UpdateClusterConfig API. Attackers may disable these logs to evade detection and reduce visibility into their activities within the Kubernetes cluster. The disabling of EKS API server and control plane logs is typically rare and should align with approved maintenance or cost optimization workflows. The rule focuses on successful attempts to disable logging, indicating a potential security compromise. This is important for defenders as it can highlight a significant gap in security monitoring within their EKS environments.
Attack Chain
- Initial access is gained through compromised AWS credentials or unauthorized administrative access.
- The attacker authenticates to the AWS environment using the compromised credentials or leverages existing administrative access.
- The attacker identifies the target EKS cluster for which they want to disable logging.
- The attacker calls the
UpdateClusterConfigAPI endpoint to modify the logging configuration. - Within the
request_parametersof the API call, theloggingsetting is modified toenabled=false. - The EKS control plane successfully processes the request and disables the logging configuration.
- The logs stop being generated from the EKS control plane, reducing visibility into cluster activity.
- The attacker proceeds with further malicious activities within the cluster, now with reduced risk of detection via control plane logs.
Impact
Disabling EKS control plane logging can severely impact an organization’s ability to detect and respond to threats within their Kubernetes environment. The number of affected clusters depends on the scope of the attacker’s access and objectives. This activity targets any AWS EKS user. Successful evasion allows threat actors to operate with impunity, potentially leading to data breaches, service disruptions, or other malicious outcomes.
Recommendation
- Deploy the Sigma rule “Detect AWS EKS Control Plane Logging Disabled” to your SIEM and tune for your environment to detect this specific behavior.
- Enable AWS CloudTrail logging and ensure proper configuration of the
logs-aws.cloudtrail-*index to provide the necessary log data for the Sigma rule. - Review IAM permissions to restrict
eks:UpdateClusterConfigto only authorized personnel and services, as described in the rule overview. - Investigate any detected instances of disabled EKS control plane logging by validating the caller identity and change records, and baseline expected automation roles, according to the false positives section.
Detection coverage 2
Detect AWS EKS Control Plane Logging Disabled
mediumDetects successful Amazon EKS UpdateClusterConfig requests that disable control plane logging.
Detect EKS UpdateClusterConfig Request
infoDetects any Amazon EKS UpdateClusterConfig requests. This can be used to monitor changes to cluster configuration.
Detection queries are available on the platform. Get full rules →