Feb 01, 2023The Hacker News
Container technology has gained traction among businesses due to
the increased efficiency it provides. In this regard, organizations
widely use Kubernetes for deploying, scaling, and managing
containerized applications. Organizations should audit Kubernetes
to ensure compliance with regulations, find anomalies, and identify
security risks. The Wazuh open source platform plays a critical
role in monitoring Kubernetes and other components of an
organization’s infrastructure.
What is Kubernetes?
Kubernetes is an open source container management solution that
automates the deployment and scaling of containers and also manages
the life cycle of containers. It organizes containers into logical
units for simple management and discovery. Kubernetes extends how
we scale containerized applications so that we may use a truly
persistent infrastructure.
You can build cloud-native applications based on microservices
with Kubernetes. Enthusiasts view Kubernetes as the cornerstone of
application modernization. It enables the containerization of
current applications, allowing developers to create applications
quickly.
The complexity of running programs grows when they spread across
several servers and containers. To handle this complexity,
Kubernetes offers an open source API that manages where and how
those containers will execute. Kubernetes incorporates load
balancing, controls service discovery, keeps track of resource
allocation, and scales based on compute use. Additionally, it
assesses the condition of each resource and gives programs the
ability to self-fix by replicating containers or restarting them
automatically.
Auditing Kubernetes
There are several policies that organizations should comply
with, depending on the jurisdiction and sector in which they
operate. Some of these policies enhance the cyber resilience of the
IT infrastructure, for example, PCI DSS and GDPR. The Kubernetes
cluster is part of the IT infrastructure, and organizations should
ensure they comply with policies and security best practices where
applicable.
One of the requirements that appear in most IT policy documents
is the log retention policy. Log retention policies dictate how
long you should store logs. You can use these logs to identify
threats during active monitoring and incident investigation.
Administrators interact with the Kubernetes cluster via the
Kubernetes API, and the cluster can log all API requests and
responses. You can detect unusual or unwanted API calls from the
Kubernetes audit logs. In more detail, you can get alerts for
events such as authentication failure, container creation,
modification, and deletion. The Kubernetes audit logging feature is
disabled by default. Therefore, you need to take some necessary
steps to turn it on.
Using Wazuh to monitor and archive Kubernetes audit logs
You need to monitor the audit logs to detect security threats
and anomalies. Additionally, you need to index the logs to search
for relevant information during an incident investigation. Wazuh[1]
monitors, stores, and indexes the Kubernetes audit logs. Wazuh is
an open source unified XDR and SIEM platform. It is commercially
free and has over 10 million annual downloads.
The Wazuh development team has a detailed guide on auditing Kubernetes with Wazuh[2]. The guide details steps
on how to do the following:
- Configure the Wazuh server to receive and process the
Kubernetes audit logs. - Enable audit logs on the Kubernetes cluster and forward them to
the Wazuh server.
You can create custom rules to trigger alerts when Wazuh detects
specific events in the Kubernetes audit log. For example, you can
create rules to trigger alerts when resources are created or
deleted on the Kubernetes cluster.
| Figure 1: Alerts triggered from Kubernetes audit logs on the Wazuh dashboard |
You can configure Wazuh to display all archived logs on the
dashboard. These are logs of Kubernetes events that did not trigger
an alert.
| Figure 2: Kubernetes audit log archive on the Wazuh dashboard |
The Wazuh indexer is a highly scalable full-text search and
analytics engine. The indexer indexes and stores the Kubernetes
audit logs to provide you with real-time data search and analytics
capabilities. The Wazuh indexer increases efficiency during an
incident investigation when you need to retrieve relevant data from
the audit logs.
Summary
Kubernetes is widely used to deploy, scale, and manage
applications. You should maintain Kubernetes audit logs for
security and compliance purposes. The audit logs contain data that
can indicate unusual or unwanted activities. Wazuh is an open
source XDR and SIEM solution that monitors, archives, and queries
Kubernetes audit logs to identify security threats and other
anomalies. Wazuh also protects other components of an IT
infrastructure, including endpoints and cloud workloads.
Wazuh has a large community of users who support each other and
help to improve the product. You can join the Wazuh
community[3] to contribute to the
product and request support for any issues you may have.
Found this article interesting? Follow us on Twitter [4]
and LinkedIn[5]
to read more exclusive content we post.
References
- ^
Wazuh
(wazuh.com) - ^
auditing
Kubernetes with Wazuh (wazuh.com) - ^
Wazuh community
(wazuh.com) - ^
Twitter
(twitter.com) - ^
LinkedIn
(www.linkedin.com)
Read more https://thehackernews.com/2023/02/auditing-kubernetes-with-open-source.html