heroui logo

GitHub Organizations Repository Archived

Splunk Security Content

View Source
Summary
The detection rule 'GitHub Organizations Repository Archived' monitors GitHub Organizations audit logs for events where repositories are archived. This rule is crucial for security operations center (SOC) teams, as the archiving of active repositories may indicate unauthorized access, insider threats, or potential attempts to disrupt development workflows. Archiving, while a legitimate action, raises red flags when it involves repositories that should remain active and accessible. This can lead to the loss of access for developers, disruption to CI/CD pipelines, and potential delays in business operations, with the risk of archived repositories being deleted leading to permanent loss of intellectual property if backups are not maintained. The rule captures details such as the actor's identity, repository metadata, and associated actions. This allows security teams to detect and respond to potentially malicious activities effectively. Implementation requires setting up GitHub Organizations logs using Splunk's Add-on for GitHub with a personal access token. The rule’s design accounts for potential false positives and assists in identifying risky behavior with specific keywords for further drill-downs into suspicious activities.
Categories
  • Cloud
  • Application
  • Identity Management
Data Sources
  • Cloud Storage
  • Application Log
  • User Account
ATT&CK Techniques
  • T1485
  • T1195
Created: 2025-01-17