
Summary
The GitHub Branch Protection Policy Override rule is designed to detect instances where a user bypasses branch protection controls in a GitHub repository. This type of behavior can signify potential malicious actions, specifically where admin credentials have been utilized to conceal unauthorized changes or activity on a protected branch. The detection focuses on audit logs from GitHub, looking for specific actions that indicate policy overrides. The rule is crucial in environments where maintaining code integrity and security is paramount, as overriding branch protection can lead to compromised code and unauthorized access. If an override is detected, it is recommended to verify that the activity was performed by a legitimate GitHub admin and to ensure it aligns with security protocols and policies. The severity of this activity is classified as high due to the potential risks associated with unauthorized code changes.
Categories
- Cloud
- Application
- Identity Management
Data Sources
- User Account
- Application Log
ATT&CK Techniques
- T1195
Created: 2022-09-02