Skip to content

Latest commit

 

History

History
62 lines (61 loc) · 2.94 KB

File metadata and controls

62 lines (61 loc) · 2.94 KB
title Security and code quality documentation
shortTitle Security and code quality
intro Build security and code quality into your {% data variables.product.github %} workflow to secure your software supply chain, prevent data leaks, and automatically find and fix vulnerabilities and code health issues in your codebase.
redirect_from
/code-security/guides
introLinks
overview generate_secret_risk_assessment_report_for_free
{% ifversion ghes %}/code-security/getting-started/github-security-features{% endif %}
{% ifversion secret-risk-assessment %}/code-security/how-tos/secure-at-scale/configure-organization-security/configure-specific-tools/assess-your-secret-risk{% endif %}
featuredLinks
startHere guideCards popular
{% ifversion fpt or ghec %}/code-security/getting-started/github-security-features{% endif %}
/code-security/getting-started/quickstart-for-securing-your-repository
{% ifversion ghes %}/code-security/secret-scanning/working-with-secret-scanning-and-push-protection{% endif %}
/code-security/tutorials/secure-your-dependencies/dependabot-quickstart-guide
/code-security/how-tos/scan-code-for-vulnerabilities/configure-code-scanning/configuring-default-setup-for-code-scanning
/code-security/trialing-github-advanced-security/planning-a-trial-of-ghas
/code-security/secret-scanning/enabling-secret-scanning-features
/code-security/how-tos/scan-code-for-vulnerabilities/configure-code-scanning/configuring-default-setup-for-code-scanning
/code-security/how-tos/secure-your-supply-chain/secure-your-dependencies/configuring-dependabot-security-updates
/code-security/how-tos/secure-your-supply-chain/secure-your-dependencies/configuring-dependabot-version-updates
{% ifversion secret-risk-assessment %}/code-security/securing-your-organization/understanding-your-organizations-exposure-to-leaked-secrets/about-secret-risk-assessment{% endif %}
{% ifversion ghes %}/admin/release-notes{% endif %}
/code-security/concepts/vulnerability-reporting-and-management/about-coordinated-disclosure-of-security-vulnerabilities
/code-security/tutorials/secure-your-organization/best-practices-for-preventing-data-leaks-in-your-organization
/code-security/tutorials/secure-your-organization/best-practice-fix-alerts-at-scale
/code-security/concepts/supply-chain-security/best-practices-for-maintaining-dependencies
changelog
label versions
security-and-compliance
fpt ghec
*
*
layout product-landing
versions
fpt ghes ghec
*
*
*
topics
Repositories
Dependencies
Vulnerabilities
children
/getting-started
/code-quality
/securing-your-organization
/secret-scanning
/code-scanning
/codeql-cli
/codeql-for-vs-code
/security-advisories
/supply-chain-security
/dependabot
/security-overview
/concepts
/how-tos
/reference
/tutorials
/responsible-use