heroui logo

GitHub App Deleted

Elastic Detection Rules

View Source
Summary
The rule detects the deletion of a GitHub app from a repository or organization by monitoring the audit logs of GitHub. Specifically, it identifies events categorized under 'integration_installation' and of type 'deletion' in order to flag potential unauthorized actions. GitHub Apps serve as crucial integrations for automating workflows, and unauthorized deletion may signify adversarial actions aimed at disrupting operations or bypassing security protocols. This detection helps organizations maintain security by tracking changes to GitHub Apps and facilitating the investigation of suspicious deletions that could indicate malicious intent.
Categories
  • Cloud
  • Application
  • Identity Management
Data Sources
  • Web Credential
  • Logon Session
  • Application Log
ATT&CK Techniques
  • T1648
Created: 2023-10-11