diff --git a/rules/integrations/github/execution_new_github_app_installed.toml b/rules/integrations/github/execution_new_github_app_installed.toml new file mode 100644 index 000000000..2d07e6bb6 --- /dev/null +++ b/rules/integrations/github/execution_new_github_app_installed.toml @@ -0,0 +1,46 @@ +[metadata] +creation_date = "2023/08/29" +integration = ["github"] +maturity = "production" +min_stack_comments = "New fields added: required_fields, related_integrations, setup" +min_stack_version = "8.3.0" +updated_date = "2023/10/03" + +[rule] +author = ["Elastic"] +description = """ +This rule detects when a new GitHub App has been installed in your organization account. +GitHub Apps extend GitHub's functionality both within and outside of GitHub. +When an app is installed it is granted permissions to read or modify your repository and organization data. +Only trusted apps should be installed and any newly installed apps should be investigated to verify their legitimacy. +Unauthorized app installation could lower your organization's security posture and leave you exposed for future attacks. +""" +from = "now-9m" +index = ["logs-github.audit-*"] +language = "eql" +license = "Elastic License v2" +name = "New GitHub App Installed" +risk_score = 47 +rule_id = "1ca62f14-4787-4913-b7af-df11745a49da" +severity = "medium" +tags = ["Domain: Cloud", "Use Case: Threat Detection", "Tactic: Execution", "Data Source: Github"] +timestamp_override = "event.ingested" +type = "eql" +query = ''' +configuration where event.dataset == "github.audit" and event.action == "integration_installation.create" +''' + +[[rule.threat]] +framework = "MITRE ATT&CK" +[[rule.threat.technique]] +id = "T1072" +name = "Software Deployment Tools" +reference = "https://attack.mitre.org/techniques/T1072/" + + + +[rule.threat.tactic] +id = "TA0002" +name = "Execution" +reference = "https://attack.mitre.org/tactics/TA0002/" +