Amazon EKS Kubernetes Audit Logs

Cloud & SaaSCloud InfrastructureAWSAmazon EKSKubernetesCloud Control PlaneSIEM / Log Aggregator

Location

CloudWatch Logs group /aws/eks/<cluster>/cluster log type: audit

Description

Kubernetes audit records emitted by the EKS-managed API server when audit logging is enabled. Captures authenticated requests for pods, secrets, service accounts, configmaps, RBAC objects, exec sessions, and other cluster resources.

Forensic Value

Audit logs are the highest-fidelity source for reconstructing attacker actions in the cluster control plane. They reveal secret reads, pod exec abuse, role-binding changes, privilege escalation through service accounts, and direct access to sensitive resources that may never appear in node logs or application telemetry.

Tools Required

AWS ConsoleAWS CLICloudWatch Logs Insightskubectl

Collection Commands

AWS CLI

aws logs filter-log-events --log-group-name "/aws/eks/<cluster-name>/cluster" --filter-pattern ""audit"" --start-time 1709251200000 --end-time 1709856000000 > eks_audit_logs.json

CloudWatch Logs Insights

fields @timestamp, @message | filter @logStream like /audit/ | sort @timestamp desc | limit 200

kubectl

kubectl get events --all-namespaces --sort-by=.metadata.creationTimestamp > eks_k8s_events.txt

Collection Constraints

  • Audit visibility depends on EKS logging being enabled and retained for the cluster before the incident.
  • Audit events must be correlated with node and workload evidence to prove what happened after the API action completed.

MITRE ATT&CK Techniques

T1552T1525T1611T1550.001

Related Blockers