GitHub secret scanning disabled or bypassed

github-telemetry

Classification:

attack

Cette page n'est pas encore disponible en français, sa traduction est en cours.
Si vous avez des questions ou des retours sur notre projet de traduction actuel, n'hésitez pas à nous contacter.

Goal

Detect when a GitHub secret scanning setting has been disabled.

Strategy

This rule monitors GitHub audit logs for when a secret scanning setting has been disabled. GitHub scans repositories for known types of secrets to prevent fraudulent use of secrets that were committed accidentally. Disabling these settings could lead to a degradation in the organization’s security posture.

Triage and response

  1. Determine if the change taken by {{@github.actor}} is authorized.
  2. If the change was not authorized or was unexpected, begin your organization’s incident response process and investigate.

Changelog

  • 21 February 2024 - Updated detection rule name.
  • 4 September 2024 - Updated detection rule name.
PREVIEWING: Cyril-Bouchiat/add-vm-package-explorer-doc