GitLab group access token created

This rule is part of a beta feature. To learn more, contact Support.

Set up the gitlab integration.

이 페이지는 아직 영어로 제공되지 않습니다. 번역 작업 중입니다.
현재 번역 프로젝트에 대한 질문이나 피드백이 있으신 경우 언제든지 연락주시기 바랍니다.

Goal

Detects when a user creates a group access token in GitLab. Group access tokens provide programmatic access to perform actions for groups and manage the projects within the group.

Strategy

This rule monitors GitLab audit events where @evt.name is group_access_token_created. The detection includes threat intelligence correlation to identify token creation from known suspicious IP addresses. Group access tokens grant API access to GitLab groups and their associated projects, making them valuable for attackers seeking to maintain persistent access to source code repositories and CI/CD pipelines.

Triage & Response

  • Verify if {{@usr.name}} has legitimate business justification for creating a group access token and appropriate permissions to do so.
  • Review the scope and permissions granted to the newly created token to ensure they align with the user’s role and responsibilities.
  • Examine the IP address and user agent associated with the token creation to identify any suspicious access patterns.
  • Check if the token creation coincides with other suspicious activities from the same user account or IP address.
  • Validate that the user account creating the token has not been compromised by reviewing recent authentication and activity logs.