T1552.007

Container API

Adversaries may gather credentials via APIs within a container environment. Docker API and Kubernetes API allow remote management of containers and cluster components. An adversary with code execution on a container or with access to an exposed Docker daemon socket (/var/run/docker.sock) can collect container logs containing credentials, environment variables with secrets, and mounted secret volumes. Via Kubernetes API with a pod's service account token, adversaries can retrieve Kubernetes Secrets containing database passwords, API keys, and credentials for cloud services. Peirates is an offensive Kubernetes tool specifically designed to exploit these APIs. Unit 42 documented unsecured Docker daemons exposing credentials.

Microsoft Sentinel / Defender
kusto
// Detect container API credential access
DeviceProcessEvents
| where Timestamp > ago(24h)
// Pattern 1: kubectl commands accessing secrets
| where FileName in~ ("kubectl", "kubectl.exe")
| where ProcessCommandLine has_any (
    "get secrets", "get secret", "describe secret", "describe secrets",
    "get sa ", "get serviceaccount", "get configmap",
    "get pods -o", "logs", "exec"
  )
| extend IsSecretAccess = ProcessCommandLine has_any ("secret", "serviceaccount", "sa")
| extend Pattern = "Kubectl_CredAccess"
| project Timestamp, DeviceName, AccountName, FileName, ProcessCommandLine,
         InitiatingProcessFileName, IsSecretAccess, Pattern
| union (
    // Pattern 2: Docker API access for credentials
    DeviceProcessEvents
    | where Timestamp > ago(24h)
    | where FileName in~ ("docker", "docker.exe")
    | where ProcessCommandLine has_any (
        "inspect", "logs", "env", "exec",
        "cp ", "volume", "/var/run/docker.sock"
      )
    | extend Pattern = "Docker_CredAccess"
    | project Timestamp, DeviceName, AccountName, FileName, ProcessCommandLine, Pattern
)
| union (
    // Pattern 3: Direct docker.sock access from processes
    DeviceFileEvents
    | where Timestamp > ago(24h)
    | where FolderPath has "docker.sock" or FileName =~ "docker.sock"
    | where InitiatingProcessFileName !in~ ("dockerd", "containerd", "docker-proxy", "docker")
    | extend Pattern = "DockerSock_UnexpectedAccess"
    | project Timestamp, DeviceName, InitiatingProcessAccountName, FolderPath, FileName,
             InitiatingProcessFileName, Pattern
)
| sort by Timestamp desc
high severity medium confidence

Data Sources

Process: Process Creation Command: Command Execution File: File Access

Required Tables

DeviceProcessEvents DeviceFileEvents

False Positives

  • DevOps engineers and platform teams legitimately accessing Kubernetes secrets for debugging and application management
  • CI/CD pipeline service accounts that need to read deployment secrets (Helm, ArgoCD, Flux) during application deployment
  • Monitoring tools (Prometheus, Grafana agents) that need access to service account tokens for cluster monitoring
  • Container security scanning tools (Trivy, Falco, Snyk) that inspect containers for vulnerabilities
  • Kubernetes operators and controllers that legitimately manage secrets as part of their controller pattern

Unlock Pro Content

Get the full detection package for T1552.007 including response playbook, investigation guide, and atomic red team tests.

Response PlaybookInvestigation GuideHunting QueriesAtomic Red Team TestsTuning Guidance

Related Detections