This document describes a threat finding type in Security Command Center. Threat findings are generated by threat detectors when they detect a potential threat in your cloud resources. For a full list of available threat findings, see Threat findings index.
Overview
To escalate privilege, a potentially malicious actor attempted to create a new
RoleBinding or ClusterRoleBinding object for the cluster-admin
role.
Event Threat Detection is the source of this finding.
How to respond
To respond to this finding, do the following:
Step 1: Review finding details
- Open the - Privilege Escalation: Creation of sensitive Kubernetes bindingsfinding as directed in Reviewing findings. The details panel for the finding opens to the Summary tab.
- On the Summary tab, review the information in the following sections: - What was detected, especially the following fields:
- Principal email: the account that made the call.
- Kubernetes bindings: the sensitive Kubernetes
binding or ClusterRoleBindingthat was created.
 
- Affected resource, especially the following fields:
- Resource display name: the Kubernetes cluster where the action occurred.
 
- Related links, especially the following fields:
- Cloud Logging URI: link to Logging entries.
- MITRE ATT&CK method: link to the MITRE ATT&CK documentation.
- Related findings: links to any related findings.
 
 
- What was detected, especially the following fields:
Step 2: Check logs
- On the Summary tab of the finding details in the Google Cloud console, go to Logs Explorer by clicking the link in the Cloud Logging URI field.
- Check for other actions taken by the principal by using the following filters: - resource.labels.cluster_name="CLUSTER_NAME"
- protoPayload.authenticationInfo.principalEmail="PRINCIPAL_EMAIL"- Replace the following: 
- CLUSTER_NAME: the value that you noted in the Resource display name field in the finding details.
- PRINCIPAL_EMAIL: the value that you noted in the Principal email field in the finding details.
 
Step 3: Research attack and response methods
- Review MITRE ATT&CK framework entries for this finding type: Privilege Escalation.
- Confirm the sensitivity of the binding created and if the roles are necessary for the subjects.
- For bindings, you can check the subject and investigate whether the subject needs the role it is binded to.
- Determine whether there are other signs of malicious activity by the principal in the logs.
- If the principal email isn't a service account, contact the owner of the account to confirm whether the legitimate owner conducted the action. - If the principal email is a service account (IAM or Kubernetes), identify the source of the action to determine its legitimacy. 
- To develop a response plan, combine your investigation results with MITRE research. 
What's next
- Learn how to work with threat findings in Security Command Center.
- Refer to the Threat findings index.
- Learn how to review a finding through the Google Cloud console.
- Learn about the services that generate threat findings.