Unusual Login

ID

unusual_login

Severity

high

Resource

Jenkins Login

Description

Detect login events in a Jenkins instance during non-working hours or from external domains. This rule allows you to configure enabled hours and trusted domains.

Impact

A security flaw in one of the CI/CD systems, such as weak authentication and authorization mechanisms, can be exploited by an adversary to obtain unauthorized access to the system or compromise the system.

This can lead to unauthorized access to sensitive information, unauthorized code execution, or other malicious activities.

To mitigate these vulnerabilities, it is important to implement strong security measures in CI/CD systems. This includes ensuring proper authentication and authorization mechanisms, regularly updating and patching systems, implementing secure configurations, and monitoring system access and activity.

Supported Technologies

This detector is supported by the following sensors:

Jenkins   Jenkins Sensor