Unusual Login
ID |
unusual_login |
Severity |
high |
Resource |
Jenkins Login |
Description
Detect login events in a Jenkins instance during non-working hours or from external domains. This rule allows you to configure enabled hours and trusted domains.
Impact
A security flaw in one of the CI/CD systems, such as weak authentication and authorization mechanisms, can be exploited by an adversary to obtain unauthorized access to the system or compromise the system.
This can lead to unauthorized access to sensitive information, unauthorized code execution, or other malicious activities.
To mitigate these vulnerabilities, it is important to implement strong security measures in CI/CD systems. This includes ensuring proper authentication and authorization mechanisms, regularly updating and patching systems, implementing secure configurations, and monitoring system access and activity.