Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Commit 4dd7be4

Browse files
authored
[EDI] Configuring global security settings for your organization (#59362)
1 parent afb5b37 commit 4dd7be4

6 files changed

Lines changed: 46 additions & 22 deletions

File tree

content/code-security/how-tos/secure-at-scale/configure-enterprise-security/establish-complete-coverage/configuring-additional-secret-scanning-settings-for-your-enterprise.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -54,6 +54,9 @@ You can customize which secret patterns are included in push protection, giving
5454

5555
1. Under "Additional settings", in the "{% data variables.product.UI_secret_protection_scanning %}" section, click anywhere inside the "Pattern configurations for push protection" row.
5656
1. In the page that gets displayed, make the desired changes in the "Enterprise setting" column.
57+
5758
{% data reusables.secret-scanning.pattern-enablement-org-enterprise %}
5859

60+
For more information on how to read data on the {% data variables.product.prodname_secret_scanning %} pattern configuration page, see [AUTOTITLE](/code-security/reference/secret-security/secret-scanning-pattern-configuration-data).
61+
5962
{% endif %}

content/code-security/how-tos/secure-at-scale/configure-organization-security/establish-complete-coverage/configuring-global-security-settings-for-your-organization.md

Lines changed: 10 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Configuring global security settings for your organization
33
shortTitle: Configure global settings
4-
intro: Customize {% data variables.product.prodname_AS %} features to strengthen the security of your organization.
4+
intro: Customize {% data variables.product.prodname_AS %} features for your organization by defining global settings that ensure consistent security standards and safeguard all your repositories.
55
permissions: '{% data reusables.permissions.security-org-enable %}'
66
versions:
77
feature: security-configurations
@@ -15,10 +15,6 @@ redirect_from:
1515
contentType: how-tos
1616
---
1717

18-
## About {% data variables.product.prodname_global_settings %}
19-
20-
Alongside {% data variables.product.prodname_security_configurations %}, which determine repository-level security settings, you should also configure {% data variables.product.prodname_global_settings %} for your organization. {% data variables.product.prodname_global_settings_caps %} apply to your entire organization, and can customize {% data variables.product.prodname_AS %} features based on your needs. {% ifversion ghes < 3.16 %}You can also create a team of security managers to monitor and maintain your organization's security.{% endif %}
21-
2218
## Accessing the {% data variables.product.prodname_global_settings %} page for your organization
2319

2420
{% data reusables.profile.access_org %}
@@ -27,8 +23,6 @@ Alongside {% data variables.product.prodname_security_configurations %}, which d
2723

2824
## Configuring global {% data variables.product.prodname_dependabot %} settings
2925

30-
{% data reusables.dependabot.dependabot-overview %}
31-
3226
You can customize several {% data variables.product.prodname_global_settings %} for {% data variables.product.prodname_dependabot %}:
3327

3428
* [Creating and managing {% data variables.dependabot.auto_triage_rules %}](#creating-and-managing-dependabot-auto-triage-rules)
@@ -44,11 +38,11 @@ You can create and manage {% data variables.dependabot.auto_triage_rules %} to i
4438
* You can create a new rule by clicking **New rule**, then entering the details for your rule and clicking **Create rule**.
4539
* You can edit an existing rule by clicking {% octicon "pencil" aria-label="Edit CURATED-OR-CUSTOM rule" %}, then making the desired changes and clicking **Save rule**.
4640

47-
For more information on {% data variables.dependabot.auto_triage_rules %}, see [AUTOTITLE](/code-security/dependabot/dependabot-auto-triage-rules/about-dependabot-auto-triage-rules) and [AUTOTITLE](/code-security/dependabot/dependabot-auto-triage-rules/customizing-auto-triage-rules-to-prioritize-dependabot-alerts#adding-custom-auto-triage-rules-to-your-organization).
41+
For more information on {% data variables.dependabot.auto_triage_rules %}, see [AUTOTITLE](/code-security/concepts/supply-chain-security/about-dependabot-auto-triage-rules) and [AUTOTITLE](/code-security/how-tos/secure-your-supply-chain/manage-your-dependency-security/customizing-auto-triage-rules-to-prioritize-dependabot-alerts#adding-custom-auto-triage-rules-to-your-organization).
4842

4943
### Grouping {% data variables.product.prodname_dependabot_security_updates %}
5044

51-
{% data variables.product.prodname_dependabot %} can group all automatically suggested security updates into a single pull request. To enable grouped security updates, select **Grouped security updates**. For more information about grouped updates and customization options, see [AUTOTITLE](/code-security/dependabot/dependabot-security-updates/configuring-dependabot-security-updates#grouping-dependabot-security-updates-into-a-single-pull-request).
45+
{% data variables.product.prodname_dependabot %} can group all automatically suggested security updates into a single pull request. To enable grouped security updates, select **Grouped security updates**. For more information about grouped updates and customization options, see [AUTOTITLE](/code-security/how-tos/secure-your-supply-chain/secure-your-dependencies/configuring-dependabot-security-updates#grouping-dependabot-security-updates-into-a-single-pull-request).
5246

5347
{% ifversion dependabot-on-actions-opt-in %}
5448

@@ -93,7 +87,7 @@ For more information about configuring self-hosted runners for {% data variables
9387

9488
### Granting {% data variables.product.prodname_dependabot %} access to private {% ifversion ghec or ghes %}and internal {% endif %}repositories
9589

96-
To update private dependencies of repositories in your organization, {% data variables.product.prodname_dependabot %} needs access to those repositories. To grant {% data variables.product.prodname_dependabot %} access to the desired private {% ifversion ghec or ghes %}or internal {% endif %}repository, scroll down to the "Grant {% data variables.product.prodname_dependabot %} access to private repositories" section, then use the search bar to find and select the desired repository. Be aware that granting {% data variables.product.prodname_dependabot %} access to a repository means all users in your organization will have access to the contents of that repository through {% data variables.product.prodname_dependabot_updates %}. For more information about the supported ecosystems for private repositories, see [AUTOTITLE](/code-security/dependabot/ecosystems-supported-by-dependabot/supported-ecosystems-and-repositories).
90+
To update private dependencies of repositories in your organization, {% data variables.product.prodname_dependabot %} needs access to those repositories. To grant {% data variables.product.prodname_dependabot %} access to the desired private {% ifversion ghec or ghes %}or internal {% endif %}repository, scroll down to the "Grant {% data variables.product.prodname_dependabot %} access to private repositories" section, then use the search bar to find and select the desired repository. Be aware that granting {% data variables.product.prodname_dependabot %} access to a repository means all users in your organization will have access to the contents of that repository through {% data variables.product.prodname_dependabot_updates %}. For more information about the supported ecosystems for private repositories, see [AUTOTITLE](/code-security/reference/supply-chain-security/supported-ecosystems-and-repositories).
9791

9892
## Configuring global {% data variables.product.prodname_code_scanning %} settings
9993

@@ -117,7 +111,7 @@ You can customize several {% data variables.product.prodname_global_settings %}
117111

118112
### Recommending the extended query suite for default setup
119113

120-
{% data variables.product.prodname_code_scanning_caps %} offers specific groups of {% data variables.product.prodname_codeql %} queries, called {% data variables.product.prodname_codeql %} query suites, to run against your code. By default, the "Default" query suite is run. {% data variables.product.company_short %} also offers the "Extended" query suite, which contains all the queries in the "Default" query suite, plus additional queries with lower precision and severity. To suggest the "Extended" query suite across your organization, select **Recommend the extended query suite for repositories enabling default setup**. For more information on built-in query suites for {% data variables.product.prodname_codeql %} default setup, see [AUTOTITLE](/code-security/code-scanning/managing-your-code-scanning-configuration/codeql-query-suites).
114+
{% data variables.product.prodname_code_scanning_caps %} offers specific groups of {% data variables.product.prodname_codeql %} queries, called {% data variables.product.prodname_codeql %} query suites, to run against your code. By default, the "Default" query suite is run. {% data variables.product.company_short %} also offers the "Extended" query suite, which contains all the queries in the "Default" query suite, plus additional queries with lower precision and severity. To suggest the "Extended" query suite across your organization, select **Recommend the extended query suite for repositories enabling default setup**. For more information on built-in query suites for {% data variables.product.prodname_codeql %} default setup, see [AUTOTITLE](/code-security/concepts/code-scanning/codeql/codeql-query-suites).
121115

122116
{% ifversion code-scanning-autofix %}
123117

@@ -129,7 +123,7 @@ You can select **{% data variables.copilot.copilot_autofix_short %}** to enable
129123

130124
### Expanding {% data variables.product.prodname_codeql %} analysis
131125

132-
You can expand {% data variables.product.prodname_codeql %} analysis coverage for all repositories in your organization that use default setup by configuring {% data variables.product.prodname_codeql %} model packs. Model packs extend the {% data variables.product.prodname_codeql %} analysis to recognize additional frameworks and libraries that are not included in the standard {% data variables.product.prodname_codeql %} libraries. This global configuration applies to repositories using default setup and allows you to specify model packs published via the container registry. For more information, see [AUTOTITLE](/code-security/code-scanning/managing-your-code-scanning-configuration/editing-your-configuration-of-default-setup#extending-coverage-for-all-repositories-in-an-organization).
126+
You can expand {% data variables.product.prodname_codeql %} analysis coverage for all repositories in your organization that use default setup by configuring {% data variables.product.prodname_codeql %} model packs. Model packs extend the {% data variables.product.prodname_codeql %} analysis to recognize additional frameworks and libraries that are not included in the standard {% data variables.product.prodname_codeql %} libraries. This global configuration applies to repositories using default setup and allows you to specify model packs published via the container registry. For more information, see [AUTOTITLE](/code-security/how-tos/scan-code-for-vulnerabilities/manage-your-configuration/editing-your-configuration-of-default-setup#extending-coverage-for-all-repositories-in-an-organization).
133127

134128
{% ifversion ghes < 3.17 %}
135129

@@ -155,7 +149,7 @@ To provide context for developers when {% data variables.product.prodname_secret
155149

156150
### Defining custom patterns
157151

158-
You can define custom patterns for {% data variables.product.prodname_secret_scanning %} with regular expressions. Custom patterns can identify secrets that are not detected by the default patterns supported by {% data variables.product.prodname_secret_scanning %}. To create a custom pattern, click **New pattern**, then enter the details for your pattern and click **Save and dry run**. For more information on custom patterns, see [AUTOTITLE](/code-security/secret-scanning/using-advanced-secret-scanning-and-push-protection-features/custom-patterns/defining-custom-patterns-for-secret-scanning).
152+
You can define custom patterns for {% data variables.product.prodname_secret_scanning %} with regular expressions. Custom patterns can identify secrets that are not detected by the default patterns supported by {% data variables.product.prodname_secret_scanning %}. To create a custom pattern, click **New pattern**, then enter the details for your pattern and click **Save and dry run**. For more information on custom patterns, see [AUTOTITLE](/code-security/how-tos/secure-your-secrets/customize-leak-detection/defining-custom-patterns-for-secret-scanning).
159153

160154
{% ifversion push-protected-pattern-configuration %}
161155

@@ -167,8 +161,11 @@ You can customize which secret patterns are included in push protection, giving
167161

168162
1. Under "Additional settings", in the "{% data variables.product.prodname_secret_scanning_caps %}" section and to the right of "Pattern configurations", click **{% octicon "gear" aria-label="The Gear icon" %}**.
169163
1. In the page that gets displayed, make the desired changes in the "Organization setting" column.
164+
170165
{% data reusables.secret-scanning.pattern-enablement-org-enterprise %}
171166

167+
For more information on how to read data on the {% data variables.product.prodname_secret_scanning %} pattern configuration page, see [AUTOTITLE](/code-security/reference/secret-security/secret-scanning-pattern-configuration-data).
168+
172169
{% endif %}
173170

174171
## Creating security managers for your organization

content/code-security/reference/secret-security/index.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -13,4 +13,5 @@ children:
1313
- /understanding-github-secret-types
1414
- /supported-secret-scanning-patterns
1515
- /risk-report-csv-contents
16+
- /secret-scanning-pattern-configuration-data
1617
---
Lines changed: 23 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,23 @@
1+
---
2+
title: Secret scanning pattern configuration data
3+
shortTitle: Secret pattern data
4+
intro: Understand the data displayed in the {% data variables.product.prodname_secret_scanning %} pattern configuration page to make informed decisions about push protection settings.
5+
permissions: '{% data reusables.permissions.secret-risk-assessment-report-generation %}'
6+
versions:
7+
feature: security-configurations
8+
topics:
9+
- Code Security
10+
- Secret scanning
11+
- Secret Protection
12+
- Organizations
13+
- Security
14+
- Advanced Security
15+
- Enterprise
16+
contentType: reference
17+
18+
---
19+
20+
When configuring push protection, you can view performance data for each secret pattern to make informed enablement decisions. Use metrics like alert volume and false positive rates to balance security with developer experience. See [AUTOTITLE](/code-security/how-tos/secure-at-scale/configure-organization-security/establish-complete-coverage/configuring-global-security-settings-for-your-organization#specifying-patterns-to-include-in-push-protection){% ifversion security-configuration-enterprise-level %} or [AUTOTITLE](/code-security/how-tos/secure-at-scale/configure-enterprise-security/establish-complete-coverage/configuring-additional-secret-scanning-settings-for-your-enterprise#specifying-patterns-to-include-in-push-protection-for-your-enterprise){% endif %}.
21+
22+
{% data reusables.secret-scanning.pattern-enablement-org-enterprise-chart %}
23+
Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,9 @@
1+
| Column | Description |
2+
|---------------------------------------------|----------------------------------------------|
3+
| Name | Name of the pattern or secret |
4+
| Alert total | Total number of alerts for the pattern (percentage and absolute numbers) |
5+
| False positives | Percentage of false positives for the pattern |
6+
| Bypass rate | Percentage of bypasses for the pattern |
7+
| {% data variables.product.github %} default | Default behavior for push protection, as recommended by {% data variables.product.github %} |
8+
| Enterprise setting | **Uneditable at organization level**</br>Current enablement status for push protection</br>Can be `Enabled`, `Disabled`, and `Default`.</br>At enterprise level, `Default` is the default value. |
9+
| Organization setting | **Only valid at organization level**</br>Current enablement status for push protection</br>Can be `Enabled`, `Disabled`, and `Enterprise` (inherited from the enterprise).</br>`Enterprise` is the default value. |

data/reusables/secret-scanning/pattern-enablement-org-enterprise.md

Lines changed: 0 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -6,12 +6,3 @@
66

77
> [!NOTE] Organization administrators and security teams can override settings configured at the enterprise level.
88
9-
| Column | Description |
10-
|---------------------------------------------|----------------------------------------------|
11-
| Name | Name of the pattern or secret |
12-
| Alert total | Total number of alerts for the pattern (percentage and absolute numbers) |
13-
| False positives | Percentage of false positives for the pattern |
14-
| Bypass rate | Percentage of bypasses for the pattern |
15-
| {% data variables.product.github %} default | Default behavior for push protection, as recommended by {% data variables.product.github %} |
16-
| Enterprise setting | **Uneditable at organization level**</br>Current enablement status for push protection</br>Can be `Enabled`, `Disabled`, and `Default`.</br>At enterprise level, `Default` is the default value. |
17-
| Organization setting | **Only valid at organization level**</br>Current enablement status for push protection</br>Can be `Enabled`, `Disabled`, and `Enterprise` (inherited from the enterprise).</br>`Enterprise` is the default value. |

0 commit comments

Comments
 (0)