
Summary
This detection rule identifies modifications or disabling of audit log event streaming in GitHub Enterprise, which is critical for maintaining visibility into audit events. By monitoring GitHub audit logs for changes that impact this functionality, the rule helps organizations detect potential malicious activities aimed at obfuscating actions taken by users, especially attackers who may attempt to alter the logs to evade detection. The significance of this detection lies in its capacity to forewarn security teams of tampering with audit logs that could precede other malicious attacks, resulting in a loss of oversight regarding user actions and significant security events. It establishes a blind spot in an organization's ability to respond to incidents, highlighting the importance of maintaining the integrity of audit log streaming in a GitHub Enterprise environment.
Categories
- Cloud
- Application
- Identity Management
Data Sources
- User Account
- Application Log
- Cloud Service
ATT&CK Techniques
- T1562.008
- T1195
Created: 2025-01-16