Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

GitHub detections improvement #3278

Open
wants to merge 44 commits into
base: develop
Choose a base branch
from
Open

Conversation

P4T12ICK
Copy link
Collaborator

@P4T12ICK P4T12ICK commented Jan 15, 2025

New GitHub detections:

  • GitHub Enterprise Created Self Hosted Runner
  • GitHub Enterprise Delete Branch Ruleset
  • GitHub Enterprise Disable 2FA Requirement
  • GitHub Enterprise Disable Audit Log Event Stream
  • GitHub Enterprise Disable Classic Branch Protection Rule
  • GitHub Enterprise Disable Dependabot
  • GitHub Enterprise Disable IP Allow List
  • GitHub Enterprise Modify Audit Log Event Stream
  • GitHub Enterprise Pause Audit Log Event Stream
  • GitHub Enterprise Remove Organization
  • GitHub Enterprise Repository Archived
  • GitHub Enterprise Repository Deleted
  • GitHub Organizations Delete Branch Ruleset
  • GitHub Organizations Disable 2FA Requirement
  • GitHub Organizations Disable Classic Branch Protection Rule
  • GitHub Organizations Disable Dependabot
  • GitHub Organizations Repository Archived
  • GitHub Organizations Repository Deleted

These detections are splitted into GitHub Enterprise and GitHub Organizations. Depending when a user collects GitHub logs on a GitHub Enterprise level or a GitHub Organizations level, the way how logs are collected are completely different and the corresponding log parsing rules. Therefore, there are cases in which the same detection is developed for both ways.

@P4T12ICK P4T12ICK added the WIP DO NOT MERGE Work in Progress label Jan 15, 2025
@P4T12ICK P4T12ICK removed the WIP DO NOT MERGE Work in Progress label Jan 20, 2025
@@ -1,15 +1,12 @@
name: GitHub
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@P4T12ICK : This data source GitHub Webhooks is not used by any detection, is there a reason to add this? I think better to delete it or update this for the deprecate content since the whole data source and ingesting is clearer that way

- field: user
type: user
score: 25
threat_objects: []
Copy link
Contributor

@patel-bhavin patel-bhavin Feb 18, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@P4T12ICK : Can we attribute something from the SPL to a threat object? maybe user_agent ? This could be applicable for all detections

especially if created by unfamiliar users or in unusual contexts.
data_source:
- GitHub Enterprise Audit Logs
search: '`github_enterprise` action=enterprise.register_self_hosted_runner
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

based on this action, should we update the name of the detection to

GitHub Enterprise Register Self Hosted Runner

@patel-bhavin
Copy link
Contributor

Can we also consider mapping some of the applicable detections to T1195 : https://attack.mitre.org/techniques/T1195/ that way we don't lose coverage

@patel-bhavin
Copy link
Contributor

Can we also update the Deprecated detection mapping sheet. Currently using this to keep track of replacement detections, if any until we have that deprecated mapping yaml

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants