Skip to content

Commit 1fb1ad8

Browse files
authored
#205 baseline permissions (#209)
1 parent f8997a9 commit 1fb1ad8

File tree

1 file changed

+6
-2
lines changed

1 file changed

+6
-2
lines changed

practices/security-repository.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,11 +8,15 @@ This guide lays out security best practice for Github repositories. This set of
88
* The guidelines in this page are a necessary, but not a sufficient, condition for code overall being secure.
99

1010
## Access controls
11-
* All users must have MFA enabled, and this should be enforced at the organisation level.
11+
### Organisation-level settings
12+
* All users must have MFA enabled.
13+
* Baseline visibility for private repositories must be "no permission".
14+
* Ability to change repository view from private to public must be reserved to admins only.
15+
16+
### Repository-specific settings
1217
* In line with the [Service Manual](https://service-manual.nhs.uk/service-standard/12-make-new-source-code-open), new repositories should be public by default, unless there is good reason not to - this avoids costly rework to secure private information further down the line.
1318
* Private repositories must disable forking.
1419
* There must be no outside collaborators in private repositories.
15-
* Ability to change repository view from private to public must be reserved to admins only, and this should be enforced at the organisation level.
1620

1721
## Code security
1822
* Enable, at a minimum, [Dependabot](https://github.blog/2020-06-01-keep-all-your-packages-up-to-date-with-dependabot/) alerts for vulnerabilities and respond to them appropriately.

0 commit comments

Comments
 (0)