
Summary
This detection rule identifies instances where a user circumvents the push protection mechanism in GitHub's secret scanning feature. The rule is triggered specifically when the audit logs record an action indicating the 'secret_scanning_push_protection.bypass'. To effectively utilize this rule, the audit log streaming feature in GitHub must be activated; this will capture relevant events that could signify an attempt to bypass security protocols related to sensitive information management. As developers increasingly rely on GitHub for version control, understanding and mitigating the risks associated with secret leakage becomes critical. The rule emphasizes monitoring and alerts for potential misuse, ensuring that appropriate security measures are continuously enforced within repositories. False positives may occur during allowed administrative activities, necessitating further evaluation of such alerts to distinguish between legitimate actions and potential threats.
Categories
- Cloud
- Web
- Application
Data Sources
- User Account
- Application Log
- Network Traffic
Created: 2024-03-07