Detectionlowtest
Bitbucket Secret Scanning Rule Deleted
Detects when secret scanning rule is deleted for the project or repository.
Convert In Phoenix Studio
Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.
Launch
Log Source
bitbucketaudit
Productbitbucket← raw: bitbucket
Serviceaudit← raw: audit
Definition
Requirements: "Basic" log level is required to receive these audit events.
Detection Logic
Detection Logic1 selector
detection:
selection:
auditType.category:
- 'Projects'
- 'Repositories'
auditType.action:
- 'Project secret scanning rule deleted'
- 'Repository secret scanning rule deleted'
condition: selectionFalse Positives
Legitimate user activity.
MITRE ATT&CK
Tactics
Sub-techniques
Rule Metadata
Rule ID
ff91e3f0-ad15-459f-9a85-1556390c138d
Status
test
Level
low
Type
Detection
Created
Sun Feb 25
Author
Path
rules/application/bitbucket/audit/bitbucket_audit_secret_scanning_rule_deleted.yml
Raw Tags
attack.defense-evasionattack.t1562.001