Skip to content

Commit 771ff2b

Browse files
committed
Cloud SIEM content release notes for December 6, 2024
1 parent 6cbabed commit 771ff2b

File tree

1 file changed

+84
-0
lines changed

1 file changed

+84
-0
lines changed

blog-cse/2024-12-06-content.md

Lines changed: 84 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,84 @@
1+
# Content Release 2024-12-06
2+
3+
This content release:
4+
- Introduces new Cloud SIEM detection rules for monitoring activity and alerts from GitHub Enterprise.
5+
- New and updated log parsing and mapping support for:
6+
- AWS VPC Transit Gateways Flow Logs
7+
- Alert Logic
8+
- Google G Suite Alert Center
9+
- Microsoft Defender Advanced Hunting
10+
- Azure Provisioning, Alert, ResourceHealth, and ServiceHealth events
11+
12+
13+
Changes are enumerated below
14+
15+
## Rules
16+
- [New] MATCH-S00952 GitHub - Administrator Added or Invited
17+
- Detects additions or invitations of GitHub Administrators. Illegitimate addition of administrative users could be an indication of privilege escalation or persistence by adversaries.
18+
- [New] MATCH-S00953 GitHub - Audit Logging Modification
19+
- Detects modifications to the GitHub Enterprise Audit Log. Modifications and deletions have the potential to reduce visibility of malicious activity.
20+
- [New] MATCH-S00954 GitHub - Copilot Seat Cancelled by GitHub
21+
- Observes for GitHub staff manually revoking copilot access for a user. This action is likely to be rare and may be indicative of a user violating the [acceptable use policy for GitHub](https://docs.github.com/en/site-policy/acceptable-use-policies)
22+
- [New] FIRST-S00091 GitHub - First Seen Activity From Country for User
23+
- Detects GitHub user activity from a new country. User account compromises can be detected through unusual geolocation in some cases. To lower possible false positives, a tuning expression for expected country names or codes can be added,.
24+
- [New] FIRST-S00090 GitHub - First Seen Application Interacting with API
25+
- Detects new application usage of the GitHub API. New applications utilizing the API may be routine, however this may also reveal malicious applications utilizing the API.
26+
- [New] MATCH-S00950 GitHub - Member Invitation or Addition
27+
- Detects new user additions or invitations to the business or organizations GitHub. New user additions/invitations should be monitored as they could be a vector for malicious actors to establish access or persistence.
28+
- [New] MATCH-S00955 GitHub - Member Permissions Modification
29+
- Detects modifications of GitHub user permissions. Added permissions for a user should be monitored for potential privilege escalation by an adversary.
30+
- [New] MATCH-S00956 GitHub - OAuth Application Activity
31+
- Detects OAuth application activities within GitHub. OAuth application management and access activity should be monitored for potential abuse by potential malicious actors, either by creating malicious access paths within GitHub, or destruction of GitHub infrastructure.
32+
- [New] MATCH-S00957 GitHub - Organization Transfer
33+
- Detects transfers of an organization to another enterprise This is a sensitive activity that should be monitored to ensure organizations and their repositories are not being transferred without proper authorization.
34+
- [New] OUTLIER-S00026 GitHub - Outlier in Distinct User Agent Strings by User
35+
- Detects an outlier in the number of distinct user agent strings for a GitHub user. Unusual user agent strings for a user account could indicate account takeover.
36+
- [New] OUTLIER-S00028 GitHub - Outlier in Removal Actions by User
37+
- Detects a higher than usual number of removal actions undertaken by a user. This detection has a broad scope to detect any unusual number of destroy, delete, or remove actions undertaken by a user to help detect a range of different potential destructive activities in GitHub.
38+
- [New] OUTLIER-S00027 GitHub - Outlier in Repository Cloning or Downloads
39+
- Detects an unusual number of repository clones for a user. Unusual repository cloning could indicate data exfiltration or discovery.
40+
- [New] MATCH-S00958 GitHub - PR Review Requirement Removed
41+
- Detects GitHub pull request review requirements being removed from a repository either via branch protection rule or ruleset.
42+
- [New] MATCH-S00959 GitHub - Repository Public Key Deletion
43+
- Detects deletions of SSH keys in GitHub. Unusual deletions could represent an adversary attempting to disrupt normal operations by denying access.
44+
- [New] MATCH-S00960 GitHub - Repository Transfer
45+
- Detects transfers of a repository to another organization or user. This is a sensitive activity that GitHub places in the "Danger Zone" of repository setting and should be monitored to ensure no unauthorized transfers are taking place.
46+
- [New] MATCH-S00961 GitHub - Repository Visibility Changed to Public
47+
- Detects a user making a repository public. This action should be closely monitored and mitigative actions taken even if the published repository is deleted, or reverted to private. Reference: https://trufflesecurity.com/blog/anyone-can-access-deleted-and-private-repo-data-github
48+
- [New] MATCH-S00962 GitHub - Repository Visibility Permissions Changed
49+
- Detects repository visibility permissions being changed to allow members of an organization to change the visibility of repositories. This activity introduces the potential for data leakage if a private or internal repository is changed to public and should be monitored to ensure no inadvertent or malicious publication of a repository.
50+
- [New] MATCH-S00963 GitHub - SSH Key Created for Private Repo
51+
- Detects the creation of an SSH key for a private GitHub repository. Performed maliciously, creating an SSH key could create a parallel access path for an attacker.
52+
- [New] MATCH-S00964 GitHub - SSO Recovery Codes Access Activity
53+
- Detects activities accessing SSO recovery codes. SSO recovery codes can enable a user to bypass normal more stringent authentication routes.
54+
- [New] MATCH-S00951 GitHub - Secret Scanning Alert
55+
- Observes for secret scanning alerts from GitHub. Secrets detected by GitHub Enterprise Cloud undergo validation by GitHub automatically, to determine whether they are actively in use, this is not surfaced in the audit log, and will require separate inspection. For more information see : [Evaluating alerts from secret scanning](https://docs.github.com/en/code-security/secret-scanning/managing-alerts-from-secret-scanning/evaluating-alerts)
56+
- [New] MATCH-S00965 GitHub - Secret Scanning Potentially Disabled
57+
- Detects actions which disable or modify secret scanning policies for an organization or repository. Modifying or disabling secret scanning may lead to inadvertent leaking of credentials.
58+
- [New] MATCH-S00966 GitHub - Two-Factor Authentication Disabled for Organization
59+
- Observes for two-factor authentication being disabled for a GitHub organization. Removing two-factor authentication requirements significantly degrades the security of the GitHub organization by permitting password only authentication.
60+
- [Updated] THRESHOLD-S00095 Password Attack from Host
61+
- Modified the rule expression to remove the srcDevice_ip entity selector and the isNull from the rule expression for entites from the existing rule, and creates a new rule for those entities so that there are 2 versions of the rules intent.
62+
63+
64+
## Log Mappers
65+
- [New] AWS VPC Transit Gateways Flow Logs
66+
- [New] Alert Logic Catch All
67+
- [New] Azure ResourceHealth and ServiceHealth
68+
- [New] Google G Suite Alert Center - User Changes
69+
- [New] Microsoft Defender Advanced Hunting - Alert
70+
- [New] Microsoft Defender Advanced Hunting - Audit
71+
- [New] Microsoft Defender Advanced Hunting - Email events
72+
- [New] Microsoft Defender Advanced Hunting - Logon
73+
- [New] Microsoft Defender Advanced Hunting - Network
74+
- [Updated] Azure Event Hub - Windows Defender Logs and Azure Alert
75+
- Adds support for additional event types and field mappings
76+
- [Updated] Trend Micro Vision One Custom Parser
77+
- Supports additional field names
78+
79+
## Parsers
80+
- [New] /Parsers/System/AWS/AWS VPC Transit Gateways Flow Logs
81+
- [New] /Parsers/System/Alert Logic/Alert Logic
82+
- [New] /Parsers/System/Microsoft/Microsoft Defender Advanced Hunting
83+
- [Updated] /Parsers/System/Trend Micro/Trend Micro Vision One
84+
- Parser updated to support additional event format

0 commit comments

Comments
 (0)