Adversaries may abuse a container administration service to execute commands within a container. A container administration service such as the Docker daemon, the Kubernetes API server, or the kubelet may allow remote management of containers within an environment.(Citation: Docker Daemon CLI)(Citation: Kubernetes API)(Citation: Kubernetes Kubelet)
In Docker, adversaries may specify an entrypoint during container deployment that executes a script or command, or they may use a command such as <code>docker exec</code> to execute a command within a running container.(Citation: Docker Entrypoint)(Citation: Docker Exec) In Kubernetes, if an adversary has sufficient permissions, they may gain remote execution in a container in the cluster via interaction with the Kubernetes API server, the kubelet, or by running a command such as <code>kubectl exec</code>.(Citation: Kubectl Exec Get Shell)
View in MITRE ATT&CK®Capability ID | Capability Description | Mapping Type | ATT&CK ID | ATT&CK Name |
---|---|---|---|---|
AC-17 | Remote Access | Protects | T1609 | Container Administration Command |
AC-02 | Account Management | Protects | T1609 | Container Administration Command |
AC-03 | Access Enforcement | Protects | T1609 | Container Administration Command |
AC-04 | Information Flow Enforcement | Protects | T1609 | Container Administration Command |
AC-05 | Separation of Duties | Protects | T1609 | Container Administration Command |
AC-06 | Least Privilege | Protects | T1609 | Container Administration Command |
CM-06 | Configuration Settings | Protects | T1609 | Container Administration Command |
CM-07 | Least Functionality | Protects | T1609 | Container Administration Command |
SC-07 | Boundary Protection | Protects | T1609 | Container Administration Command |
SI-10 | Information Input Validation | Protects | T1609 | Container Administration Command |
SI-07 | Software, Firmware, and Information Integrity | Protects | T1609 | Container Administration Command |