Skip to content

Commit 9584fd8

Browse files
committed
Add initial message about security scanning enablement.
1 parent da99526 commit 9584fd8

File tree

2 files changed

+18
-1
lines changed

2 files changed

+18
-1
lines changed

20230803.md

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,15 @@
1+
# New Security Settings Being Enabled Across Google GitHub orgs August 8
2+
3+
> Tl;dr - Starting August 8th, we will be enforcing some default security settings across all Google-owned GitHub organizations. We don’t anticipate these changes having any negative impact on anyone's workflows, and in general work should continue as it has.
4+
5+
In an effort to increase security for open source development happening in Google-owned GitHub repositories, we will start enforcing the following settings on all Google-owned repositories, beginning August 8.
6+
7+
[Dependency Graph Generation](https://docs.github.com/en/code-security/supply-chain-security/understanding-your-software-supply-chain/about-the-dependency-graph) - This tool scans the language-specific packaging files in your repositories, and populates a “Dependency Graph” page that lists them ([example](https://github.com/google/github_nonpublic_api/network/dependencies)). This enables one-click SBOM generation based on that information. This feature was already enabled on most repositories.
8+
9+
[Dependabot](https://docs.github.com/en/code-security/dependabot) and [Dependabot Alerts](https://docs.github.com/en/code-security/dependabot/dependabot-alerts/about-dependabot-alerts) - This tool alerts you to vulnerable dependencies and creates pull requests to update any out-of-date dependencies in your project. This feature was already enabled on most repositories.
10+
11+
[Code Scanning](https://docs.github.com/en/code-security/code-scanning/automatically-scanning-your-code-for-vulnerabilities-and-errors/about-code-scanning) - This tool scans your code base and incoming PRs for possible issues in the code (through static analysis) and reports them back to you. This feature is VERY configurable and has a ton of options, but we are just enabling the default settings. We expect in this configuration for the alerts to be very high signal.
12+
13+
[Secret Scanning](https://docs.github.com/en/code-security/secret-scanning/about-secret-scanning) and Push Protection - This tool scans your code and looks for anything that may be a “secret” and warns you about it. This will also run on “git push” and block any PRs that appear to have secrets in them. We know that Google Cloud Credentials that hit GitHub are exploited in under 60 minutes, so we are turning these features on to help keep us all safe from simple accidents. (There are a handful of valid use cases for pushing secrets to a public repo—such as for testing, etc.—for those cases GitHub has provided details on how to [bypass push protection](https://docs.github.com/en/code-security/secret-scanning/about-secret-scanning).)
14+
15+
We will begin enabling features starting on August 8th and they should be deployed everywhere by the end of the week. If you suspect that one of these changes has caused a huge workflow interruption for your team and you are a Googler, please file a ticket at go/github-request and we will take a look. If not, please file a ticket with your affected project and ask the project owners to escalate to us.

README.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1 +1,3 @@
1-
# google-admin.github.io
1+
# google-admin.github.io
2+
3+
This site is used for the google-admin team to communicate with users of Google owned GitHub repositories.

0 commit comments

Comments
 (0)