Files
blue-team-tools/rules/cloud/github/github_delete action_invoked.yaml
T
2023-01-20 18:14:14 +05:00

31 lines
958 B
YAML

title: Github Delete Action Invoked
id: 16a71777-0b2e-4db7-9888-9d59cb75200b
status: experimental
description: Detects delete action in the Github audit logs for codespaces, environment, project and repo.
author: Muhammad Faisal
date: 2023/01/19
references:
- https://docs.github.com/en/organizations/keeping-your-organization-secure/managing-security-settings-for-your-organization/reviewing-the-audit-log-for-your-organization#audit-log-actions
tags:
- attack.impact
- attack.t1213.003
logsource:
product: github
service: audit_logs
detection:
selection:
action:
- 'codespaces.delete'
- 'environment.delete'
- 'project.delete'
- 'repo.destroy'
condition: selection
fields:
- 'action'
- 'actor'
- 'org'
- 'actor_location.country_code'
falsepositives:
- Validate the deletion activity is permitted. The "actor" field need to be validated.
level: medium