Detectionmediumtest

Bitbucket Global Permission Changed

Detects global permissions change activity.

Convert In Phoenix Studio

Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.

Launch
Muhammad FaisalCreated Sun Feb 25aac6c4f4-87c7-4961-96ac-c3fd3a42c310application
Log Source
bitbucketaudit
Productbitbucket← raw: bitbucket
Serviceaudit← raw: audit

Definition

Requirements: "Advance" log level is required to receive these audit events.

Detection Logic
Detection Logic1 selector
detection:
    selection:
        auditType.category: 'Permissions'
        auditType.action:
            - 'Global permission remove request'
            - 'Global permission removed'
            - 'Global permission granted'
            - 'Global permission requested'
    condition: selection
False Positives

Legitimate user activity.

Rule Metadata
Rule ID
aac6c4f4-87c7-4961-96ac-c3fd3a42c310
Status
test
Level
medium
Type
Detection
Created
Sun Feb 25
Path
rules/application/bitbucket/audit/bitbucket_audit_global_permissions_change_detected.yml
Raw Tags
attack.persistenceattack.privilege-escalationattack.t1098
View on GitHub