
Summary
The 'GitHub Secret Scanning Alert Created' rule is designed to monitor and detect when GitHub generates a secret scanning alert due to the identification of a leaked secret, such as an API key or password. This detection rule focuses on the audit logs provided by GitHub, analyzing log entries that indicate a secret scanning alert has been created. When the rule is triggered, it suggests that an alert was logged for potentially sensitive information being exposed in the repository. The rule is classified as Medium severity and is linked to the MITRE ATT&CK technique TA0006:T1552, emphasizing its relevance in the broader context of sensitive data protection within organizations. The suggested remedial action in the runbook involves examining the alerted secret to decide whether it should be revoked or if the alert itself can be ignored for operational reasons. This process helps maintain the integrity of code security within GitHub repositories and enables organizations to respond swiftly to potential security incidents.
Categories
- Cloud
- Application
Data Sources
- User Account
- Application Log
ATT&CK Techniques
- T1552
Created: 2022-12-02