Atlassian administrative API token activity observed

Cette page n'est pas encore disponible en français, sa traduction est en cours.
Si vous avez des questions ou des retours sur notre projet de traduction actuel, n'hésitez pas à nous contacter.

Goal

Detect when Atlassian administrative API token activity is observed.

Strategy

This rule monitors Atlassian organization audit logs for when an administrator API token activity is observed. An attacker may create or revoke an API token either as a method of persisting within the Atlassian environment or degrading the security controls of an organization or disrupting operations. These API tokens allow users to manage organization settings and users via the admin APIs.

Triage and response

  1. Determine if the user {{@usr.email}} intended to create or revoke a new API token:
    • Is there a related ticket tracking this change?
    • Is {{@usr.email}} aware of this activity?
    • Is the network metadata associated with the activity unusual for this user?
  2. If the results of the triage indicate that {{@usr.email}} was not aware of this activity or it did not originate from a known network, begin your company’s incident response process, and start an investigation.
PREVIEWING: safchain/fix-custom-agent