Skip to content

Hide Navigation Hide TOC

Container Creation (a5ae90ca-0c4b-481c-959f-0eb18a7ff953)

"Container Creation" data component captures details about the initial construction of a container in a containerized environment. This includes events where a new container is instantiated, such as through Docker, Kubernetes, or other container orchestration platforms. Monitoring these events helps detect unauthorized or potentially malicious container creation. Examples:

  • Docker Example: docker create my-container, docker run --name=my-container nginx:latest
  • Kubernetes Example: kubectl run my-pod --image=nginx, kubectl create deployment my-deployment --image=nginx
  • Cloud Container Services Example
    • AWS ECS: Task or service creation (RunTask or CreateService).
    • Azure Container Instances: Deployment of a container group.
    • Google Kubernetes Engine (GKE): Creation of new pods via GCP APIs.

This data component can be collected through the following measures:

  • Docker Audit Logging: Enable Docker daemon logging to capture create commands. Configure the Docker daemon to use a log driver such as syslog or json-file.
  • Kubernetes Audit Logs: Enable Kubernetes API server audit logging:
  • Cloud Provider Logs
    • AWS CloudTrail: Enable logging for ECS RunTask or CreateService events.
    • Azure Monitor: Enable activity logging for container group creation.
    • GCP Cloud Logging: Monitor API calls such as container.projects.zones.clusters.create.
  • SIEM Integration: Use a SIEM to collect logs from Docker, Kubernetes, or cloud platforms.
Cluster A Galaxy A Cluster B Galaxy B Level
Escape to Host - T1611 (4a5b7ade-8bb5-4853-84ed-23f262002665) Attack Pattern Container Creation (a5ae90ca-0c4b-481c-959f-0eb18a7ff953) mitre-data-component 1
Container Creation (a5ae90ca-0c4b-481c-959f-0eb18a7ff953) mitre-data-component Scheduled Task/Job - T1053 (35dd844a-b219-4e2b-a6bb-efa9a75995a9) Attack Pattern 1
Malicious Image - T1204.003 (b0c74ef9-c61e-4986-88cb-78da98a355ec) Attack Pattern Container Creation (a5ae90ca-0c4b-481c-959f-0eb18a7ff953) mitre-data-component 1
Container Service - T1543.005 (b0e54bf7-835e-4f44-bd8e-62f431b9b76a) Attack Pattern Container Creation (a5ae90ca-0c4b-481c-959f-0eb18a7ff953) mitre-data-component 1
Container Creation (a5ae90ca-0c4b-481c-959f-0eb18a7ff953) mitre-data-component Container Orchestration Job - T1053.007 (1126cab1-c700-412f-a510-61f4937bb096) Attack Pattern 1
Create or Modify System Process - T1543 (106c0cf6-bf73-4601-9aa8-0945c2715ec5) Attack Pattern Container Creation (a5ae90ca-0c4b-481c-959f-0eb18a7ff953) mitre-data-component 1
User Execution - T1204 (8c32eb4d-805f-4fc5-bf60-c4d476c131b5) Attack Pattern Container Creation (a5ae90ca-0c4b-481c-959f-0eb18a7ff953) mitre-data-component 1
Deploy Container - T1610 (56e0d8b8-3e25-49dd-9050-3aa252f5aa92) Attack Pattern Container Creation (a5ae90ca-0c4b-481c-959f-0eb18a7ff953) mitre-data-component 1
Malicious Image - T1204.003 (b0c74ef9-c61e-4986-88cb-78da98a355ec) Attack Pattern User Execution - T1204 (8c32eb4d-805f-4fc5-bf60-c4d476c131b5) Attack Pattern 2
Create or Modify System Process - T1543 (106c0cf6-bf73-4601-9aa8-0945c2715ec5) Attack Pattern Container Service - T1543.005 (b0e54bf7-835e-4f44-bd8e-62f431b9b76a) Attack Pattern 2
Scheduled Task/Job - T1053 (35dd844a-b219-4e2b-a6bb-efa9a75995a9) Attack Pattern Container Orchestration Job - T1053.007 (1126cab1-c700-412f-a510-61f4937bb096) Attack Pattern 2