Skip to content

Commit a31b2d4

Browse files
author
Patrick Bareiss
committed
Improve detection
1 parent 2018be8 commit a31b2d4

File tree

1 file changed

+6
-5
lines changed

1 file changed

+6
-5
lines changed

detections/cloud/github_disable_dependabot.yml

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -14,15 +14,16 @@ description: The following analytic detects when a user disables Dependabot secu
1414
remain unpatched, potentially leading to code execution, data theft, or other compromises through the software supply chain.
1515
data_source:
1616
- GitHub
17-
search: '`github_enterprise` action=repository_vulnerability_alerts.disable OR vendor_action=repository_vulnerability_alerts.disable
17+
search: '`github_enterprise` action=repository_vulnerability_alerts.disable
1818
| fillnull
19-
| stats count min(_time) as firstTime max(_time) as lastTime by actor, actor_id, actor_ip, actor_is_bot, actor_location.country_code, business, business_id, org, org_id, repo, repo_id, user, user_agent, user_id, action, vendor_action
19+
| stats count min(_time) as firstTime max(_time) as lastTime by actor, actor_id, actor_ip, actor_is_bot, actor_location.country_code, business, business_id, org, org_id, repo, repo_id, user, user_agent, user_id, action
2020
| `security_content_ctime(firstTime)` | `security_content_ctime(lastTime)`
2121
| `github_disable_dependabot_filter`'
22-
how_to_implement: You must ingest GitHub Enterprise logs using the Splunk Add-on for GitHub https://splunkbase.splunk.com/app/6254 .
22+
how_to_implement: You must ingest GitHub Enterprise logs using Audit log streaming as described in this documentation https://docs.github.com/en/enterprise-cloud@latest/admin/monitoring-activity-in-your-enterprise/reviewing-audit-logs-for-your-enterprise/streaming-the-audit-log-for-your-enterprise#setting-up-streaming-to-splunk .
2323
known_false_positives: unknown
2424
references:
2525
- https://www.googlecloudcommunity.com/gc/Community-Blog/Monitoring-for-Suspicious-GitHub-Activity-with-Google-Security/ba-p/763610
26+
- https://docs.github.com/en/enterprise-cloud@latest/admin/monitoring-activity-in-your-enterprise/reviewing-audit-logs-for-your-enterprise/streaming-the-audit-log-for-your-enterprise#setting-up-streaming-to-splunk
2627
drilldown_searches:
2728
- name: View the detection results for - "$user$"
2829
search: '%original_detection_search% | search user = "$user$"'
@@ -71,5 +72,5 @@ tests:
7172
- name: True Positive Test
7273
attack_data:
7374
- data: https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1562.001/disable_dependabot/github.json
74-
source: github
75-
sourcetype: github:cloud:audit
75+
source: http:github
76+
sourcetype: httpevent

0 commit comments

Comments
 (0)