Product
high
advisory
Potential Direct Kubelet Access via Process Arguments
2 rules 3 TTPsDetection of potential direct Kubelet access via process arguments in Linux containers, which could lead to enumeration, execution, or lateral movement within the Kubernetes cluster.
Defend for Containers
container
kubelet
kubernetes
lateral-movement
execution
2r
3t
high
advisory
Nsenter Execution with Target Flag Inside Container
2 rules 1 TTPThe rule detects nsenter executions from inside a monitored Linux container that include a namespace target flag (-t or --target), which can be abused to escape container isolation.
Defend for Containers
container
privilege-escalation
linux
2r
1t
high
advisory
Kubeletctl Execution Inside Container Detected
3 rules 3 TTPsThis rule detects the execution of kubeletctl inside a container, which can be used to enumerate the Kubelet API or other resources inside the container, potentially indicating lateral movement attempts within the pod.
Defend for Containers
container
kubeletctl
lateral-movement
execution
3r
3t