Github SSH Certificate Configuration Changed
Detects when changes are made to the SSH certificate configuration of the organization.
Sigma rule (View on GitHub)
1title: Github SSH Certificate Configuration Changed
2id: 2f575940-d85e-4ddc-af13-17dad6f1a0ef
3status: test
4description: Detects when changes are made to the SSH certificate configuration of the organization.
5references:
6 - https://docs.github.com/en/enterprise-cloud@latest/organizations/managing-git-access-to-your-organizations-repositories/about-ssh-certificate-authorities
7 - https://docs.github.com/en/enterprise-cloud@latest/admin/monitoring-activity-in-your-enterprise/reviewing-audit-logs-for-your-enterprise/audit-log-events-for-your-enterprise#ssh_certificate_authority
8author: Romain Gaillard (@romain-gaillard)
9date: 2024-07-29
10tags:
11 - attack.initial-access
12 - attack.defense-evasion
13 - attack.persistence
14 - attack.privilege-escalation
15 - attack.t1078.004
16logsource:
17 product: github
18 service: audit
19 definition: 'Requirements: The audit log streaming feature must be enabled to be able to receive such logs. You can enable following the documentation here: https://docs.github.com/en/enterprise-cloud@latest/admin/monitoring-activity-in-your-enterprise/reviewing-audit-logs-for-your-enterprise/streaming-the-audit-log-for-your-enterprise#setting-up-audit-log-streaming'
20detection:
21 selection:
22 action:
23 - 'ssh_certificate_authority.create' # An SSH certificate authority for an organization or enterprise was created.
24 - 'ssh_certificate_requirement.disable' # The requirement for members to use SSH certificates to access an organization resources was disabled.
25 condition: selection
26falsepositives:
27 - Allowed administrative activities.
28level: medium
References
Related rules
- AWS IAM S3Browser LoginProfile Creation
- AWS IAM S3Browser Templated S3 Bucket Policy Creation
- AWS IAM S3Browser User or AccessKey Creation
- AWS Root Credentials
- AWS SAML Provider Deletion Activity