diff --git a/rules/integrations/github/persistence_organization_owner_role_granted.toml b/rules/integrations/github/persistence_organization_owner_role_granted.toml new file mode 100644 index 00000000000..0d757fe43f0 --- /dev/null +++ b/rules/integrations/github/persistence_organization_owner_role_granted.toml @@ -0,0 +1,47 @@ +[metadata] +creation_date = "2023/09/11" +integration = ["github"] +maturity = "production" +min_stack_comments = "New fields added: required_fields, related_integrations, setup" +min_stack_version = "8.3.0" +updated_date = "2023/09/11" + +[rule] +author = ["Elastic"] +description = """ +This rule detects when a member is granted the organization owner role of a GitHub organization. +This role provides admin level privileges. Any new owner role should be investigated to determine its validity. +Unauthorized owner roles could indicate compromise within your organization and provide unlimited access to data and settings. +""" +from = "now-9m" +index = ["logs-github.audit-*"] +language = "eql" +license = "Elastic License v2" +name = "GitHub Owner Role Granted To User" +risk_score = 47 +rule_id = "9b343b62-d173-4cfd-bd8b-e6379f964ca4" +severity = "medium" +tags = ["Domain: Cloud", "Use Case: Threat Detection", "Tactic: Persistence", "Data Source: Github"] +timestamp_override = "event.ingested" +type = "eql" +query = ''' +iam where event.dataset == "github.audit" and event.action == "org.update_member" and github.permission == "admin" +''' + +[[rule.threat]] +framework = "MITRE ATT&CK" +[[rule.threat.technique]] +id = "T1098" +name = "Account Manipulation" +reference = "https://attack.mitre.org/techniques/T1098/" +[[rule.threat.technique.subtechnique]] +id = "T1098.003" +name = "Additional Cloud Roles" +reference = "https://attack.mitre.org/techniques/T1098/003/" + + +[rule.threat.tactic] +id = "TA0003" +name = "Persistence" +reference = "https://attack.mitre.org/tactics/TA0003/" +