
Summary
This detection rule is designed to monitor for events that occur when a repository or organization is being transferred within GitHub. The ability to transfer repositories and organizations is a significant feature of GitHub, but it also poses potential risks related to unauthorized access and changes in ownership. By enabling audit log streaming as specified in the rule's prerequisites, security teams can gain visibility over these actions, allowing them to identify potentially suspicious transfers of repositories or organizations. The rule specifically looks for actions related to migration events, such as `migration.create`, `org.transfer_outgoing`, `org.transfer`, and `repo.transfer_outgoing`. By monitoring these actions, the rule helps ensure that repository ownership and organization settings remain under proper governance and do not fall into unauthorized hands. It categorizes such activities as medium-level risks, and while it acknowledges that legitimate administrative activities may trigger the rule, it emphasizes the need for vigilance against potential misuse of these features.
Categories
- Cloud
- Web
- Identity Management
Data Sources
- Web Credential
- Application Log
- User Account
Created: 2024-07-29