Atlassian administrative API token activity observed

このページは日本語には対応しておりません。随時翻訳に取り組んでいます。翻訳に関してご質問やご意見ございましたら、お気軽にご連絡ください。

Goal

Detect when Atlassian administrative API token activity is observed.

Strategy

This rule monitors Atlassian organization audit logs for when an administrator API token activity is observed. An attacker may create or revoke an API token either as a method of persisting within the Atlassian environment or degrading the security controls of an organization or disrupting operations. These API tokens allow users to manage organization settings and users via the admin APIs.

Triage and response

  1. Determine if the user {{@usr.email}} intended to create or revoke a new API token:
    • Is there a related ticket tracking this change?
    • Is {{@usr.email}} aware of this activity?
    • Is the network metadata associated with the activity unusual for this user?
  2. If the results of the triage indicate that {{@usr.email}} was not aware of this activity or it did not originate from a known network, begin your company’s incident response process, and start an investigation.