GitHub UEBA - Multiple Alerts from a GitHub Accountedit

This rule is part of the "GitHub UEBA - Unusual Activity from Account Pack", and leverages alert data to determine when multiple alerts are executed by the same user in a timespan of one hour. Analysts can use this to prioritize triage and response, as these alerts are a higher indicator of compromised user accounts or PATs.

Rule type: threshold

Rule indices:

  • .alerts-security.*

Severity: medium

Risk score: 47

Runs every: 5m

Searches indices from: now-60m (Date Math format, see also Additional look-back time)

Maximum alerts per execution: 100

References: None

Tags:

  • Domain: Cloud
  • Use Case: Threat Detection
  • Use Case: UEBA
  • Tactic: Execution
  • Rule Type: Higher-Order Rule
  • Data Source: Github

Version: 1

Rule authors:

  • Elastic

Rule license: Elastic License v2

Rule queryedit

signal.rule.tags:("Use Case: UEBA" and "Data Source: Github") and kibana.alert.workflow_status:"open"

Framework: MITRE ATT&CKTM