GitHub OAuth application access restrictions disabled

github-telemetry

Classification:

attack

Cette page n'est pas encore disponible en français, sa traduction est en cours.
Si vous avez des questions ou des retours sur notre projet de traduction actuel, n'hésitez pas à nous contacter.

Goal

Detect when GitHub OAuth application access restrictions have been disabled.

Strategy

This rule monitors GitHub audit logs for when GitHub OAuth application access restrictions have been disabled. Organizations can choose which OAuth applications have access to their repositories and other resources by enabling OAuth app access restrictions. An attacker with unauthorized access could authorize a third-party OAuth application allowing them to maintain access to a GitHub environment without these restrictions.

Triage and response

  1. Determine if the change taken by {{@github.actor}} is authorized.
  2. If the change was not authorized or unexpected, begin your organization’s incident response process and investigate.
PREVIEWING: safchain/fix-custom-agent