Github New Secret Created
Detects when a user creates action secret for the organization, environment, codespaces or repository.
Sigma rule (View on GitHub)
1title: Github New Secret Created
2id: f9405037-bc97-4eb7-baba-167dad399b83
3status: test
4description: Detects when a user creates action secret for the organization, environment, codespaces or repository.
5author: Muhammad Faisal (@faisalusuf)
6date: 2023-01-20
7references:
8 - https://docs.github.com/en/organizations/keeping-your-organization-secure/managing-security-settings-for-your-organization/reviewing-the-audit-log-for-your-organization#audit-log-actions
9tags:
10 - attack.defense-evasion
11 - attack.persistence
12 - attack.privilege-escalation
13 - attack.initial-access
14 - attack.t1078.004
15logsource:
16 product: github
17 service: audit
18 definition: 'Requirements: The audit log streaming feature must be enabled to be able to receive such logs. You can enable following the documentation here: https://docs.github.com/en/enterprise-cloud@latest/admin/monitoring-activity-in-your-enterprise/reviewing-audit-logs-for-your-enterprise/streaming-the-audit-log-for-your-enterprise#setting-up-audit-log-streaming'
19detection:
20 selection:
21 action:
22 - 'codespaces.create_an_org_secret'
23 - 'environment.create_actions_secret'
24 - 'org.create_actions_secret'
25 - 'repo.create_actions_secret'
26 condition: selection
27falsepositives:
28 - This detection cloud be noisy depending on the environment. It is recommended to keep a check on the new secrets when created and validate the "actor".
29level: low
References
Related rules
- Github Self Hosted Runner Changes Detected
- Account Tampering - Suspicious Failed Logon Reasons
- Activity From Anonymous IP Address
- Application Using Device Code Authentication Flow
- Applications That Are Using ROPC Authentication Flow