heroui logo

GitHub UEBA - Multiple Alerts from a GitHub Account

Elastic Detection Rules

View Source
Summary
This rule is designed to detect suspicious behavior patterns in GitHub accounts by monitoring for multiple alerts triggered by the same user within a one-hour timeframe. Leveraging User and Entity Behavior Analytics (UEBA), it aims to identify compromised accounts or Personal Access Tokens (PATs) by flagging instances where an unusual number of alerts occurs rapidly. The rule's severity is set to medium, indicating that such activity could signify a security breach that warrants immediate investigation. It suggests a structured approach to triage and respond to alerts, with recommended investigative steps including reviewing user activity logs, checking for permission changes, and contacting users to confirm the legitimacy of actions. Potential false positives may arise from automated workflows or legitimate bursts of activity, which necessitate a keen review process. If a compromise is confirmed, several immediate mitigation steps are advised, including revoking access tokens, enforcing multi-factor authentication (MFA), and notifying relevant security teams.
Categories
  • Cloud
  • Identity Management
  • Application
Data Sources
  • User Account
  • Application Log
Created: 2023-12-14