heroui logo

GitHub Enterprise Disable IP Allow List

Splunk Security Content

View Source
Summary
The "GitHub Enterprise Disable IP Allow List" rule is designed to identify actions within GitHub Enterprise where an IP allow list is disabled, which is a potential indicator of security risk. IP allow lists are critical as they restrict access to resources within GitHub to predefined trusted IP addresses. Disabling these lists opens up the system to unauthorized access, potentially allowing attackers to exploit sensitive code repositories. This detection relies on GitHub Enterprise audit logs to monitor for the specific action of disabling the IP allow list at either the organization or enterprise levels. The rule aggregates information such as the actor, location, user agent, and the business context to provide a comprehensive view of the event. Responses from SOC teams are triggered in such cases to investigate whether these changes were authorized or if they stem from compromised credentials or potential insider threats. Implementing this rule requires configuring log ingestion from GitHub's audit streaming to Splunk, aligning with best practices in monitoring and security protocols.
Categories
  • Cloud
  • Application
  • Identity Management
Data Sources
  • Pod
  • Container
  • User Account
  • Image
  • Application Log
  • Logon Session
  • Process
ATT&CK Techniques
  • T1562.001
  • T1195
Created: 2025-01-20