Back to all scenarios
Scenario #268
Security
Kubernetes v1.24, Azure AKS

Lack of Audit Logging

Absence of audit logging hindered the ability to detect and investigate security incidents.

Find this helpful?
What Happened

A security incident occurred, but due to the lack of audit logs, it was challenging to trace the actions leading up to the incident and identify the responsible parties.

Diagnosis Steps
  • 1Attempted to review audit logs for the incident timeframe.
  • 2Discovered that audit logging was not enabled.
  • 3Assessed the impact of missing audit data on the investigation.
Root Cause

Audit logging was not configured in the Kubernetes cluster.

Fix/Workaround
• Enabled audit logging in the cluster.
• Configured log retention and monitoring policies.
• Integrated audit logs with a centralized logging system for analysis.
Lessons Learned

Audit logs are essential for monitoring and investigating security events.

How to Avoid
  • 1Enable and configure audit logging in all clusters.
  • 2Regularly review and analyze audit logs for anomalies.