GitHub App Deleted

Detects the deletion of a GitHub app either from a repo or an organization.

Elastic rule (View on GitHub)

 1[metadata]
 2creation_date = "2023/10/11"
 3integration = ["github"]
 4maturity = "production"
 5updated_date = "2024/05/21"
 6
 7[rule]
 8author = ["Elastic"]
 9description = "Detects the deletion of a GitHub app either from a repo or an organization.\n"
10from = "now-9m"
11index = ["logs-github.audit-*"]
12language = "eql"
13license = "Elastic License v2"
14name = "GitHub App Deleted"
15risk_score = 21
16rule_id = "fd01b949-81be-46d5-bcf8-284395d5f56d"
17severity = "low"
18tags = ["Domain: Cloud", "Use Case: Threat Detection", "Tactic: Execution", "Data Source: Github"]
19timestamp_override = "event.ingested"
20type = "eql"
21
22query = '''
23configuration where event.dataset == "github.audit" and github.category == "integration_installation" and event.type == "deletion"
24'''
25
26
27[[rule.threat]]
28framework = "MITRE ATT&CK"
29[[rule.threat.technique]]
30id = "T1648"
31name = "Serverless Execution"
32reference = "https://attack.mitre.org/techniques/T1648/"
33
34
35[rule.threat.tactic]
36id = "TA0002"
37name = "Execution"
38reference = "https://attack.mitre.org/tactics/TA0002/"

Related rules

to-top