Detection Strategy for Container Administration Command Abuse

ID: DET0065
Domains: Enterprise
Analytics: AN0177
Version: 1.0
Created: 21 October 2025
Last Modified: 21 October 2025

Analytics

AN0177

Defenders may detect abuse of container administration commands by observing anomalous use of management utilities (docker exec, kubectl exec, or API calls to kubelet) correlated with unexpected process creation inside containers. Behavioral chains include unauthorized API requests followed by command execution within running pods or containers, often originating from unusual user accounts, automation scripts, or IP addresses outside the expected cluster management plane.

Log Sources
Data Component Name Channel
Command Execution (DC0064) docker:daemon docker exec or docker run with unexpected command/entrypoint
Process Creation (DC0032) kubernetes:apiserver kubectl exec or kubelet API calls targeting running pods
Mutable Elements
Field Description
AuthorizedAdminUsers Expected admin accounts allowed to use exec commands; anomalies outside this list indicate possible abuse.
ExecFrequencyThreshold Defines how often `docker exec` or `kubectl exec` is normally observed; sudden spikes may indicate adversary behavior.
SourceIPRange Expected IP ranges for management actions (e.g., cluster control plane). Requests from external/unexpected ranges may indicate compromise.
NamespaceScope Defines which namespaces typically allow exec operations; anomalous activity outside these may indicate lateral movement.