
Summary
This detection rule identifies when GitHub Secret Scanning has been disabled for a repository, which may signal an attempt by adversaries to evade detection mechanisms that scan for hardcoded secrets, like API keys or sensitive credentials. By disabling this feature, malicious actors can potentially reduce the likelihood of exposure of their illicit activities, facilitating further compromises or even data exfiltration. The rule utilizes EQL (Event Query Language) to track events associated with the GitHub audit logs, specifically looking for changes in repository configurations that disable secret scanning. The risk score of this detection is set at 21, indicating a low but significant alert level for security teams to consider during analysis. Moreover, the rule is linked to the MITRE ATT&CK framework, categorizing it under 'Defense Evasion' tactics, specifically under technique T1562, which focuses on impairing defenses by disabling or modifying security tools. The comprehensive nature of this detection rule aids in alerting organizations regarding potential threats to their repositories.
Categories
- Cloud
- Infrastructure
Data Sources
- User Account
- Application Log
- Network Traffic
ATT&CK Techniques
- T1562
- T1562.001
Created: 2023-12-16