|
1 | 1 | In this unit, you'll learn more about the preventive measures you can take to maintain the health of your GitHub repositories.
|
2 | 2 |
|
3 |
| -Suppose you're an administrator who is helping to onboard many new collaborators to your organization. You need to make sure they contribute to the proper repositories and have easy access to assistance if they discover a security threat. To do this, you set security policies. |
| 3 | +Suppose you're an administrator who's helping to onboard many new collaborators to your organization. You need to make sure they contribute to the proper repositories and have easy access to assistance if they discover a security threat. To do this, you set security policies. |
4 | 4 |
|
5 | 5 | :::image type="content" source="../media/setting-security-policies.png" alt-text="Three screenshots stacked on each other, slightly offset, which show community health files in a repository and settings for an organization.":::
|
6 | 6 |
|
@@ -63,11 +63,11 @@ GitHub uses and displays these default files for any repository owned by the acc
|
63 | 63 |
|
64 | 64 | ## Security settings
|
65 | 65 |
|
66 |
| -The other component of creating robust security policies is taking advantage of GitHub's built-in security settings and features. Imagine you're onboarding collaborators whose scope of work varies; some are part of focused teams to implement a feature, while others are responsible for watching over the code base for issues, and a few others might need to assist you with administrative duties. In this section, you'll learn about settings that define user permissions and allow automation of common security tasks. |
| 66 | +The other component of creating robust security policies is taking advantage of GitHub's built-in security settings and features. Imagine you're onboarding collaborators whose scope of work varies; some are part of focused teams to implement a feature, while others are responsible for watching over the code base for issues, and a few others might need to assist you with administrative duties. In this section, you'll learn about settings that define user permissions and allow you to automate common security tasks. |
67 | 67 |
|
68 | 68 | ### Change settings according to a trust and control position
|
69 | 69 |
|
70 |
| -Every organization has a trust and control position: circumstances that determine how much trust you can safely extend to individual collaborators and teams, and how much control you need to maintain over basic permissions. |
| 70 | +Every organization has a trust and control position: circumstances that determine how much trust you can safely extend to individual collaborators and teams and how much control you need to maintain over basic permissions. |
71 | 71 |
|
72 | 72 | If your organization is a new business with a small team, it likely has few moving parts and few areas of potential security vulnerability. After all, when team members work in the same office or in nearby time zones, it's easy to identify who can take specific actions and how to contact them. In this case, you can safely trust most or all collaborators with high levels of access and capability.
|
73 | 73 |
|
@@ -106,22 +106,21 @@ As you can see, settings that Enterprise administrators enforce cascade down to
|
106 | 106 | Changing security settings at the organization level or for all organizations covered by the Enterprise plan is powerful, because it can standardize user capabilities during unusual circumstances. In the preceding example, you might need to restrict capabilities to all but a few users for an organization—or even for the whole enterprise—in response to a security threat. In contrast, you could temporarily allow greater capabilities to all users in an organization during a rare development effort where you need help from extra personnel.
|
107 | 107 |
|
108 | 108 | > [!NOTE]
|
109 |
| -> Available settings and tools differ based on the type of repository. In addition, |
110 |
| -> these settings and features differ in their level of required user interaction. |
| 109 | +> Available settings and tools differ based on the type of repository. In addition, these settings and features differ in their level of required user interaction. |
111 | 110 |
|
112 | 111 | :::image type="content" source="../media/availability-interaction.png" alt-text="Diagram of a four-quadrant graph, divided by x and y axes, which categorizes security settings by availability to users (x axis) and required level of interaction (y axis).":::
|
113 | 112 |
|
114 | 113 | ### What kinds of security settings are available to administrators?
|
115 | 114 |
|
116 | 115 | Access restrictions, security documentation, advisories, Dependabot alerts and security updates, Dependabot version updates, and the GitHub dependency graph are available for all repositories. Documentation and advisories require the most significant manual interaction, but applying Dependabot to your code base automates parts of the security process, up to and including updating dependencies.
|
117 | 116 |
|
118 |
| -Code scanning alerts, secret scanning alerts, and dependency review provide further automation to the security process. Enabling these GitHub features will flag vulnerabilities in code submitted to a repository, highlighting suspicious code. However, these features are only available for private repositories with an Advanced Security license or public repositories. |
| 117 | +Code scanning alerts, secret scanning alerts, and dependency review provide further automation to the security process. Enabling these GitHub features flags vulnerabilities in code submitted to a repository, highlighting suspicious code. However, these features are only available for private repositories with an Advanced Security license or public repositories. |
119 | 118 |
|
120 | 119 | If you have a security vulnerability, you can create a security advisory to privately discuss and fix the vulnerability.
|
121 | 120 |
|
122 | 121 | ## Security advisories
|
123 | 122 |
|
124 |
| -You've been vigilant in your efforts to maintain healthy code, establishing clear policies and enacting settings to help collaborators work within their scope. But despite your team's efforts, someone identified a vulnerability in published code. This happens to every team sooner or later--no one is perfect. |
| 123 | +You've been vigilant in your efforts to maintain healthy code, establishing clear policies and enacting settings to help collaborators work within their scope. But despite your team's efforts, someone identified a vulnerability in published code. This happens to every team sooner or later; no one is perfect. |
125 | 124 |
|
126 | 125 | When you identify a security threat, your team's response will go beyond patching offending sections of code. In this section, you'll learn the basics of the GitHub security advisory tools that allow you to draft and publish comprehensive documentation on the nature of the threat.
|
127 | 126 |
|
|
0 commit comments