Atlassian administrative API token activity observed

This page is not yet available in Spanish. We are working on its translation.
If you have any questions or feedback about our current translation project, feel free to reach out to us!

Goal

Detect when Atlassian administrative API token activity is observed.

Strategy

This rule monitors Atlassian organization audit logs for when an administrator API token activity is observed. An attacker may create or revoke an API token either as a method of persisting within the Atlassian environment or degrading the security controls of an organization or disrupting operations. These API tokens allow users to manage organization settings and users via the admin APIs.

Triage and response

  1. Determine if the user {{@usr.email}} intended to create or revoke a new API token:
    • Is there a related ticket tracking this change?
    • Is {{@usr.email}} aware of this activity?
    • Is the network metadata associated with the activity unusual for this user?
  2. If the results of the triage indicate that {{@usr.email}} was not aware of this activity or it did not originate from a known network, begin your company’s incident response process, and start an investigation.