GitHub OAuth application access restrictions disabled

github-telemetry

Classification:

attack

This page is not yet available in Spanish. We are working on its translation.
If you have any questions or feedback about our current translation project, feel free to reach out to us!

Goal

Detect when GitHub OAuth application access restrictions have been disabled.

Strategy

This rule monitors GitHub audit logs for when GitHub OAuth application access restrictions have been disabled. Organizations can choose which OAuth applications have access to their repositories and other resources by enabling OAuth app access restrictions. An attacker with unauthorized access could authorize a third-party OAuth application allowing them to maintain access to a GitHub environment without these restrictions.

Triage and response

  1. Determine if the change taken by {{@github.actor}} is authorized.
  2. If the change was not authorized or unexpected, begin your organization’s incident response process and investigate.
PREVIEWING: rtrieu/product-analytics-ui-changes