Container API
Adversaries may gather credentials via APIs within a containers environment. APIs in these environments, such as the Docker API and Kubernetes APIs, allow a user to remotely manage their container resources and cluster components.(Citation: Docker API)(Citation: Kubernetes API) An adversary may access the Docker API to collect logs that contain credentials to cloud, container, and various other resources in the environment.(Citation: Unit 42 Unsecured Docker Daemons) An adversary with sufficien...
BY SOURCE
PROCEDURES (10)
Auto-extracted: 4 detections for anomal
Auto-extracted: 1 detections for container
Auto-extracted: 1 detections for service
Auto-extracted: 1 detections for container
Auto-extracted: 1 detections for persist
Auto-extracted: 1 detections for api
Auto-extracted: 1 detections for unusual
Auto-extracted: 1 detections for service
Auto-extracted: 1 detections for service
Auto-extracted: 1 detections for general monitoring