heroui logo

High Number of Protected Branch Force Pushes by User

Elastic Detection Rules

View Source
Summary
The detection rule titled "High Number of Protected Branch Force Pushes by User" is designed to identify suspicious activity on GitHub related to force pushes to protected branches, which are key to maintaining the integrity of repository history. This rule flags instances where a single user performs a high number of force pushes—specifically, ten or more—in a short time frame (within an 8-minute interval of the last 9 minutes). The detection logic analyzes logs from GitHub's audit trails, focusing on events that are categorized as 'change' actions involving 'policy_override' specifically tied to protected branches. The underlying rationale for monitoring these actions is that adversaries may attempt to erase or overwrite commit history to cause disruptions in development workflows or to exfiltrate sensitive information, thus leading to potential data loss. By effectively leveraging GitHub's event logs, this rule implements a statistical analysis that aggregates user actions, allowing for timely alerts when abnormal activity patterns that could indicate malicious intent are detected.
Categories
  • Cloud
  • Application
Data Sources
  • User Account
  • Application Log
  • Network Traffic
ATT&CK Techniques
  • T1485
  • T1020
  • T1567
  • T1567.001
Created: 2025-12-16