GitHub SAML/OIDC has been disabled

github-telemetry

Classification:

attack

This page is not yet available in Spanish. We are working on its translation.
If you have any questions or feedback about our current translation project, feel free to reach out to us!

Goal

Detect when GitHub OIDC/SAML single sign-on (SSO) has been modified.

Strategy

This rule monitors GitHub audit logs for when OIDC/SAML SSO has been modified. GitHub allows for use of a SSO solution to increase security and centralize identity and access for the web application that your team uses. Disabling these settings could lead to a degradation in the organization’s security posture.

Triage and response

  1. Determine if the change taken by {{@github.actor}} is authorized.
  2. If the change was not authorized or was unexpected, begin your organization’s incident response process and investigate.
PREVIEWING: Cyril-Bouchiat/add-vm-package-explorer-doc