heroui logo

GitHub Enterprise Register Self Hosted Runner

Splunk Security Content

View Source
Summary
This analytic rule identifies the creation of self-hosted runners in GitHub Enterprise by monitoring audit logs for registration actions at the organization or enterprise level. Self-hosted runners can execute jobs on infrastructure controlled by users, making them potentially vulnerable to exploitation. Compromised runners could lead to remote code execution, data exfiltration, and lateral movement within the network. Therefore, monitoring their creation is critical for security operations center (SOC) teams to verify legitimate use, especially if they are generated by unknown users or in unexpected contexts. This detection aims to flag such actions to prevent abuse and maintain a secure GitHub Enterprise environment.
Categories
  • Cloud
  • Web
  • Application
  • Infrastructure
Data Sources
  • User Account
  • Application Log
  • Web Credential
ATT&CK Techniques
  • T1562.001
  • T1195
Created: 2025-01-20