GitHub OAuth application access restrictions disabled

github-telemetry

Classification:

attack

このページは日本語には対応しておりません。随時翻訳に取り組んでいます。翻訳に関してご質問やご意見ございましたら、お気軽にご連絡ください。

Goal

Detect when GitHub OAuth application access restrictions have been disabled.

Strategy

This rule monitors GitHub audit logs for when GitHub OAuth application access restrictions have been disabled. Organizations can choose which OAuth applications have access to their repositories and other resources by enabling OAuth app access restrictions. An attacker with unauthorized access could authorize a third-party OAuth application allowing them to maintain access to a GitHub environment without these restrictions.

Triage and response

  1. Determine if the change taken by {{@github.actor}} is authorized.
  2. If the change was not authorized or unexpected, begin your organization’s incident response process and investigate.
PREVIEWING: rtrieu/product-analytics-ui-changes