Skip to content

Commit

Permalink
selection item added.
Browse files Browse the repository at this point in the history
  • Loading branch information
faisalusuf committed Jan 29, 2023
1 parent 6ef4ee2 commit 60c3221
Show file tree
Hide file tree
Showing 3 changed files with 69 additions and 0 deletions.
1 change: 1 addition & 0 deletions rules/cloud/github/dependabot_alerts_disabled.yml
Expand Up @@ -23,6 +23,7 @@ detection:
- 'dependabot_alerts_new_repos.disable'
- 'dependabot_security_updates.disable'
- 'dependabot_security_updates_new_repos.disable'
- 'repository_vulnerability_alerts.disable'
condition: selection
fields:
- 'action'
Expand Down
36 changes: 36 additions & 0 deletions rules/cloud/github/github_high_risk_configuration_change.yml
@@ -0,0 +1,36 @@
title: Github High Risk Configuration Change
id: 8622c92d-c00e-463c-b09d-fd06166f6794
status: experimental
description: Detects when a user disables a critical security feature for an organization.
author: Muhammad Faisal
date: 2023/01/29
references:
- https://docs.github.com/en/organizations/managing-oauth-access-to-your-organizations-data/disabling-oauth-app-access-restrictions-for-your-organization
- https://docs.github.com/en/organizations/keeping-your-organization-secure/managing-security-settings-for-your-organization/reviewing-the-audit-log-for-your-organization#dependabot_alerts-category-actions
- https://docs.github.com/en/repositories/managing-your-repositorys-settings-and-features/enabling-features-for-your-repository/managing-security-and-analysis-settings-for-your-repository
tags:
- attack.t1556
logsource:
product: github
service: audit
detection:
selection:
action:
- 'org.disable_oauth_app_restrictions'
- 'org.disable_two_factor_requirement'
- 'repo.advanced_security_disabled'
- 'org.advanced_security_policy_selected_member_disabled'
condition: selection
fields:
- 'action'
- 'actor'
- 'org'
- 'actor_location.country_code'
- 'transport_protocol_name'
- 'repository'
- 'repo'
- 'repository_public'
- '@timestamp'
falsepositives:
- Approved administrator/owner activities.
level: critical
32 changes: 32 additions & 0 deletions rules/cloud/github/github_new_org_member_alert.yml
@@ -0,0 +1,32 @@
title: Github New Org Member Alert
id: 3908d64a-3c06-4091-b503-b3a94424533b
status: experimental
description: Detects when a new member is added or invited to the org.
author: Muhammad Faisal
date: 2023/01/29
references:
- https://docs.github.com/en/organizations/keeping-your-organization-secure/managing-security-settings-for-your-organization/reviewing-the-audit-log-for-your-organization#dependabot_alerts-category-actions
tags:
- attack.t1136.003
logsource:
product: github
service: audit
detection:
selection:
action:
- 'org.add_member'
- 'org.invite_member'
condition: selection
fields:
- 'action'
- 'actor'
- 'org'
- 'actor_location.country_code'
- 'transport_protocol_name'
- 'repository'
- 'repo'
- 'repository_public'
- '@timestamp'
falsepositives:
- Organization approved new members
level: informational

0 comments on commit 60c3221

Please sign in to comment.