heroui logo

Github Delete Action Invoked

Sigma Rules

View Source
Summary
This detection rule focuses on identifying delete actions in GitHub's audit logs pertaining to Codespaces, environments, projects, and repositories. It monitors for specific actions such as `codespaces.delete`, `environment.delete`, `project.delete`, and `repo.destroy`. These actions could indicate malicious activity or misconfigurations leading to accidental data loss. The rule requires the audit log streaming feature to be enabled in order to receive relevant logs for effective monitoring. Users should also note that false positives may occur if a legitimate actor performs the deletion, necessitating validation of the `actor` responsible for the action. Therefore, it is advisable to implement additional context to affirm the legitimacy of the deletion before taking any incident response actions.
Categories
  • Cloud
  • Web
  • Application
Data Sources
  • User Account
  • Application Log
Created: 2023-01-19