heroui logo

GitHub Repository Deleted

Elastic Detection Rules

View Source
Summary
The rule titled 'GitHub Repository Deleted' is designed to detect unauthorized deletion events of GitHub repositories within an organization's account. This rule utilizes Elastic Query Language (EQL) to search through GitHub's audit logs for instances of the action labeled 'repo.destroy'. Given the critical role that repositories play in code management and collaboration, any deletion can pose significant risks such as data loss or disruption of operations. Therefore, the detection of such actions necessitates prompt investigation to verify their validity. The rule operates on logs from GitHub auditing, is categorized under medium-risk severity, and is tagged for various use cases such as Threat Detection and User and Entity Behavior Analytics (UEBA). When an event is detected, the recommended investigation steps include reviewing audit logs, validating user permissions, confirming the deletion's intent, and establishing any links to unauthorized access that could indicate a security breach. Response to unauthorized deletions involves revoking user access, restoring data from backups, and enhancing monitoring and security protocols to prevent future incidents.
Categories
  • Cloud
  • Application
  • Identity Management
Data Sources
  • User Account
  • Application Log
  • Cloud Service
  • Script
  • Web Credential
ATT&CK Techniques
  • T1485
Created: 2023-08-29