Additional Container Cluster Roles (T1098.006)

View on ATT&CK

In Playbook

Associated Tactics

  • Persistence
  • Privilege Escalation

Persistence (TA0003)

The adversary is trying to maintain their foothold. Persistence consists of techniques that adversaries use to keep access to systems across restarts, changed credentials, and other interruptions that could cut off their access. Techniques used for persistence include any access, action, or configuration changes that let them maintain their foothold on systems, such as replacing or hijacking legitimate code or adding startup code.

View on ATT&CK

Procedure Examples

Description Source(s)
Amazon Web Services. (n.d.). IAM roles for service accounts. Retrieved July 14, 2023. AWS EKS IAM Roles for Service Accounts
Google Cloud. (n.d.). Create IAM policies. Retrieved July 14, 2023. Google Cloud Kubernetes IAM
Kuberenets. (n.d.). Using ABAC Authorization. Retrieved July 14, 2023. Kuberentes ABAC
Kubernetes. (n.d.). Role Based Access Control Good Practices. Retrieved March 8, 2023. Kubernetes RBAC
Michael Katchinskiy, Assaf Morag. (2023, April 21). First-Ever Attack Leveraging Kubernetes RBAC to Backdoor Clusters. Retrieved July 14, 2023. Aquasec Kubernetes Attack 2023
Microsoft Azure. (2023, April 28). Access and identity options for Azure Kubernetes Service (AKS). Retrieved July 14, 2023. Microsoft Azure Kubernetes Service Service Accounts