GitLab project visibility changed

This rule is part of a beta feature. To learn more, contact Support.

Set up the gitlab integration.

이 페이지는 아직 영어로 제공되지 않습니다. 번역 작업 중입니다.
현재 번역 프로젝트에 대한 질문이나 피드백이 있으신 경우 언제든지 연락주시기 바랍니다.

Goal

Detects when the visibility level of a GitLab project is changed. Changes to public visibility may expose sensitive code and data to unauthorized users.

Strategy

This rule monitors the project_visibility_level_updated GitLab audit event. The detection tracks when users modify project visibility settings, which can include changes that make previously private or internal projects publicly accessible.

Triage & Response

  • Verify if {{@usr.name}} had legitimate authorization to change the project visibility settings.
  • Examine the specific project that was modified and determine if it contains sensitive code or data that should not be publicly accessible.
  • Review the project’s previous visibility level to understand the scope of the exposure change.
  • Check if the visibility change aligns with documented business requirements or approved change requests.
  • Determine if any sensitive information, credentials, or proprietary code may have been inadvertently exposed through the visibility change.