title: Github High Risk Configuration Disabled id: 8622c92d-c00e-463c-b09d-fd06166f6794 status: experimental description: Detects when a user disables a critical security feature for an organization. author: Muhammad Faisal date: 2023/01/29 references: - https://docs.github.com/en/organizations/managing-oauth-access-to-your-organizations-data/disabling-oauth-app-access-restrictions-for-your-organization - https://docs.github.com/en/organizations/keeping-your-organization-secure/managing-security-settings-for-your-organization/reviewing-the-audit-log-for-your-organization#dependabot_alerts-category-actions - https://docs.github.com/en/repositories/managing-your-repositorys-settings-and-features/enabling-features-for-your-repository/managing-security-and-analysis-settings-for-your-repository tags: - attack.credential_access - attack.defense_evasion - attack.persistence - attack.t1556 logsource: product: github service: audit definition: 'Requirements: The audit log streaming feature must be enabled to be able to receive such logs. You can enable following the documentation here: https://docs.github.com/en/enterprise-cloud@latest/admin/monitoring-activity-in-your-enterprise/reviewing-audit-logs-for-your-enterprise/streaming-the-audit-log-for-your-enterprise#setting-up-audit-log-streaming' detection: selection: action: - 'org.disable_oauth_app_restrictions' - 'org.disable_two_factor_requirement' - 'repo.advanced_security_disabled' - 'org.advanced_security_policy_selected_member_disabled' condition: selection fields: - 'action' - 'actor' - 'org' - 'actor_location.country_code' - 'transport_protocol_name' - 'repository' - 'repo' - 'repository_public' - '@timestamp' falsepositives: - Approved administrator/owner activities. level: high