Atlassian administrative API token activity observed

이 페이지는 아직 한국어로 제공되지 않으며 번역 작업 중입니다. 번역에 관한 질문이나 의견이 있으시면 언제든지 저희에게 연락해 주십시오.

Goal

Detect when Atlassian administrative API token activity is observed.

Strategy

This rule monitors Atlassian organization audit logs for when an administrator API token activity is observed. An attacker may create or revoke an API token either as a method of persisting within the Atlassian environment or degrading the security controls of an organization or disrupting operations. These API tokens allow users to manage organization settings and users via the admin APIs.

Triage and response

  1. Determine if the user {{@usr.email}} intended to create or revoke a new API token:
    • Is there a related ticket tracking this change?
    • Is {{@usr.email}} aware of this activity?
    • Is the network metadata associated with the activity unusual for this user?
  2. If the results of the triage indicate that {{@usr.email}} was not aware of this activity or it did not originate from a known network, begin your company’s incident response process, and start an investigation.