493daf54f5
The severity level changed to high from critical. The rule name matched the modified title.
37 lines
1.4 KiB
YAML
37 lines
1.4 KiB
YAML
title: Disable Github High Risk Configuration
|
|
id: 8622c92d-c00e-463c-b09d-fd06166f6794
|
|
status: experimental
|
|
description: Detects when a user disables a critical security feature for an organization.
|
|
author: Muhammad Faisal
|
|
date: 2023/01/29
|
|
references:
|
|
- https://docs.github.com/en/organizations/managing-oauth-access-to-your-organizations-data/disabling-oauth-app-access-restrictions-for-your-organization
|
|
- https://docs.github.com/en/organizations/keeping-your-organization-secure/managing-security-settings-for-your-organization/reviewing-the-audit-log-for-your-organization#dependabot_alerts-category-actions
|
|
- https://docs.github.com/en/repositories/managing-your-repositorys-settings-and-features/enabling-features-for-your-repository/managing-security-and-analysis-settings-for-your-repository
|
|
tags:
|
|
- attack.t1556
|
|
logsource:
|
|
product: github
|
|
service: audit
|
|
detection:
|
|
selection:
|
|
action:
|
|
- 'org.disable_oauth_app_restrictions'
|
|
- 'org.disable_two_factor_requirement'
|
|
- 'repo.advanced_security_disabled'
|
|
- 'org.advanced_security_policy_selected_member_disabled'
|
|
condition: selection
|
|
fields:
|
|
- 'action'
|
|
- 'actor'
|
|
- 'org'
|
|
- 'actor_location.country_code'
|
|
- 'transport_protocol_name'
|
|
- 'repository'
|
|
- 'repo'
|
|
- 'repository_public'
|
|
- '@timestamp'
|
|
falsepositives:
|
|
- Approved administrator/owner activities.
|
|
level: high
|