Files
blue-team-tools/rules/cloud/github/disable_github_high_risk_configuration.yml
T
z00t 493daf54f5 Update and rename github_high_risk_configuration_change.yml to disable_github_high_risk_configuration.yml
The severity level changed to high from critical. The rule name matched the modified title.
2023-01-29 23:59:53 +05:00

37 lines
1.4 KiB
YAML

title: Disable Github High Risk Configuration
id: 8622c92d-c00e-463c-b09d-fd06166f6794
status: experimental
description: Detects when a user disables a critical security feature for an organization.
author: Muhammad Faisal
date: 2023/01/29
references:
- https://docs.github.com/en/organizations/managing-oauth-access-to-your-organizations-data/disabling-oauth-app-access-restrictions-for-your-organization
- https://docs.github.com/en/organizations/keeping-your-organization-secure/managing-security-settings-for-your-organization/reviewing-the-audit-log-for-your-organization#dependabot_alerts-category-actions
- https://docs.github.com/en/repositories/managing-your-repositorys-settings-and-features/enabling-features-for-your-repository/managing-security-and-analysis-settings-for-your-repository
tags:
- attack.t1556
logsource:
product: github
service: audit
detection:
selection:
action:
- 'org.disable_oauth_app_restrictions'
- 'org.disable_two_factor_requirement'
- 'repo.advanced_security_disabled'
- 'org.advanced_security_policy_selected_member_disabled'
condition: selection
fields:
- 'action'
- 'actor'
- 'org'
- 'actor_location.country_code'
- 'transport_protocol_name'
- 'repository'
- 'repo'
- 'repository_public'
- '@timestamp'
falsepositives:
- Approved administrator/owner activities.
level: high