turbot/tailpipe-mod-github-security-log-detections

Query: ssh_key_deleted

Usage

powerpipe query github_security_log_detections.query.ssh_key_deleted

Tailpipe Tables

SQL

select
tp_timestamp as timestamp,
action as operation,
fingerprint as resource,
actor,
tp_source_ip as source_ip,
tp_id as source_id,
*
exclude (actor, timestamp)
from
github_security_log
where
action = 'public_key.delete'
order by
tp_timestamp desc;

Detections

The query is being used by the following detections: