This document describes a threat finding type in Security Command Center. Threat findings are generated by threat detectors when they detect a potential threat in your cloud resources. For a full list of available threat findings, see Threat findings index.
Overview
Someone deployed a workload (for example, a Pod or Deployment) in
the kube-system
or kube-public
namespaces. These namespaces are critical
for GKE cluster operations, and unauthorized workloads could compromise
cluster stability or security.
Event Threat Detection is the source of this finding.
How to respond
The following response plan might be appropriate for this finding, but might also impact operations. Carefully evaluate the information you gather in your investigation to determine the best way to resolve findings.
To respond to this finding, do the following:
- Identify the deployed workload and its purpose.
- If the workload is unauthorized, delete it and investigate the source of deployment.
What's next
- Learn how to work with threat findings in Security Command Center.
- Refer to the Threat findings index.
- Learn how to review a finding through the Google Cloud console.
- Learn about the services that generate threat findings.