Skip to content

Commit 3eaad97

Browse files
Add information on policy settings to prevent future ghas enablement (#58090)
Co-authored-by: mc <[email protected]>
1 parent ab4fd32 commit 3eaad97

File tree

1 file changed

+5
-0
lines changed

1 file changed

+5
-0
lines changed

content/code-security/securing-your-organization/managing-the-security-of-your-organization/managing-your-github-advanced-security-license-usage.md

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -57,6 +57,11 @@ To learn about licensing for {% data variables.product.prodname_GHAS_cs_and_sp %
5757

5858
The simplest way to turn off all {% data variables.product.prodname_cs_or_sp %} features for one or more repositories is to create a security configuration where the product is disabled at the top level. You can apply this custom configuration to repositories where you want to turn off paid features.
5959

60+
To prevent future enablement of security features, we recommend you ask your enterprise administrator to set the enterprise account's {% data variables.product.prodname_AS %} policies so that:
61+
* {% data variables.product.prodname_AS %} is **not available**.
62+
* Repository administrators are **not allowed** to enable or disable {% data variables.product.prodname_AS %} features for their repositories.
63+
See [AUTOTITLE](/admin/enforcing-policies/enforcing-policies-for-your-enterprise/enforcing-policies-for-code-security-and-analysis-for-your-enterprise).
64+
6065
> [!TIP]
6166
> Ensure that you give your custom configuration a very clear name, for example: "No Code Security" or "Secret Protection and Supply chain only" to avoid confusion.
6267

0 commit comments

Comments
 (0)