← Back to SOC feed Coverage →

GitHub Update Permissions

kql MEDIUM Azure-Sentinel
T1098T1562
huntingmicrosoftofficial
This rule was pulled from an open-source repository and enriched with AI. Validate in a test environment before deploying to production.
View original rule at Azure-Sentinel →
Retrieved: 2026-04-24T09:00:00Z · Confidence: medium

Hunt Hypothesis

Adversaries may update GitHub permissions to gain unauthorized access or modify repository configurations, indicating potential compromise. SOC teams should proactively hunt for this behavior in Azure Sentinel to identify unauthorized changes and detect early signs of account compromise or lateral movement.

KQL Query


GitHubAudit
| where Action == "org.update_default_repository_permission"
| project TimeGenerated, Action, Actor, Country, Repository, PreviousPermission, CurrentPermission

Analytic Rule Definition

id: ec986fb7-34ed-4528-a5f3-a496e61d8860
name: GitHub Update Permissions
description: |
  'This hunting query identifies GitHub activites where permissions are updated that may be a sign of compromise.'
requiredDataConnectors: []
tactics:
  - Persistence
  - DefenseEvasion
relevantTechniques:
  - T1098
  - T1562
query: |

  GitHubAudit
  | where Action == "org.update_default_repository_permission"
  | project TimeGenerated, Action, Actor, Country, Repository, PreviousPermission, CurrentPermission

MITRE ATT&CK Context

References

False Positive Guidance

Original source: https://github.com/Azure/Azure-Sentinel/blob/main/Hunting Queries/GitHub/Org Repositories Default Permissions Change.yaml