Security Monitoring in GitHub
Are you keeping an eye on what happens inside your source code management platform?

In today's data-rich environment, organizations constantly grapple with the need to manage, secure, and analyze valuable information. For organizations whose success depends on software development, the ability to control and monitor access to such data in the Source Code Management (SCM) platforms is critical for maintaining security and compliance. Logs are essential to this system – they record nearly everything in the platform, from code commits to file uploads, permission changes to error messages, and much more. However, most organizations don't pay enough attention to the activity happening in their SCM platforms.
Over the years, SCM platforms have increasingly become of interest to malicious actors who seek to exploit vulnerabilities and gain unauthorized access to a company's intellectual property or sensitive information. When a breach occurs, SCM logs can be an essential tool for determining the scope of the attack, assessing the damage, and tracing the source of the intrusion back to its origin.
This highlights a critical priority: organizations must proactively ensure that their SCM platforms generate adequate logs and, more importantly, that those logs are appropriately stored and analyzed. Below are a few recommendations on how organizations can achieve this within GitHub, Microsoft’s AI-powered SCM platform product:
- Turn on IP addresses in GitHub logs: GitHub allows administrators to turn on IP addresses in their logs, which enables organizations to identify where traffic is coming from and where potential attacks are occurring. This can be particularly useful for identifying unauthorized access, as organizations can more quickly determine any suspicious login attempts or activity, which in turn can be used to take immediate action in case an attacker has compromised user credentials. Additionally, this can also aid in strengthening the organization's security posture, as IP address data can provide signals to further refine security policies and potentially implement IP-based access controls for preventive risk reduction.
- Monitor logs proactively: It's not enough to generate logs and store them somewhere. Organizations should also proactively monitor their logs for signs of malicious activity, such as unusual user behavior, large file transfers, unauthorized access, and failed authentication attempts. By monitoring logs around software development proactively, organizations can detect security incidents faster and take prompt action to mitigate the damage.
- Send GitHub logs to your SIEM: As a step towards the previous recommendation, organizations may opt to send their logs to their Security Information and Event Management (SIEM) platform such as Microsoft Sentinel. SIEM systems aggregate and analyze logs and events from various sources, allowing organizations to quickly detect incidents, investigate issues, and take appropriate action. Audit logs generated by GitHub are a valuable resource that provides a trail of user and system activities. Sending these log events to your SIEM empowers your organization to comprehensively view your GitHub environment and detect any anomalies or potential threats.
Capturing logs can help organizations diagnose and troubleshoot issues, track user behavior, improve performance, and, most importantly, detect potential security incidents before they escalate into expensive incidents. By prioritizing the logs from GitHub and monitoring the data for potentially suspicious events, organizations are better prepared for potential cyber threats and can focus more on innovation and growth.
Insights on cyber security
KPMG professionals are passionate and objective about cyber security. We’re always thinking, sharing and debating. Because when it comes to cyber security, we’re in it together.
Meet our team

