You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/README.md
-5Lines changed: 0 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -290,11 +290,6 @@ journeyTracks:
290
290
- Type: `String`, one of the `overview`, `quick_start`, `tutorial`, `how_to`, `reference`.
291
291
- Optional.
292
292
293
-
### `topics`
294
-
- Purpose: Indicate the topics covered by the article. Refer to the content models for more details about adding topics. A full list of existing topics is located in the [allowed topics file](/data/allowed-topics.ts). If topics in article frontmatter and the allow-topics list become out of sync, the [topics CI test](/src/search/tests/topics.ts) will fail.
295
-
- Type: Array of `String`s
296
-
- Optional: Topics are preferred for each article, but, there may be cases where existing articles don't yet have topics, or adding a topic to a new article may not add value.
297
-
298
293
### `communityRedirect`
299
294
- Purpose: Set a custom link and link name for `Ask the GitHub community` link in the footer.
300
295
- Type: `Object`. Properties are `name` and `href`.
## Contributing to multiple accounts using SSH and multiple keys
105
+
106
+
If you are a member of an {% data variables.enterprise.prodname_emu_enterprise %}, but also want to collaborate outside your enterprise using a personal account, you can use different SSH keys for each account. For more information about using SSH, see [AUTOTITLE](/authentication/connecting-to-github-with-ssh).
107
+
> [!WARNING]
108
+
> You cannot use the same SSH key to contribute to both repositories inside your {% data variables.enterprise.prodname_emu_org %} and outside the enterprise.
109
+
110
+
1. Generate a different SSH key forthe repositoriesin your {% data variables.enterprise.prodname_emu_org %}. See [AUTOTITLE](/authentication/connecting-to-github-with-ssh/generating-a-new-ssh-key-and-adding-it-to-the-ssh-agent#generating-a-new-ssh-key). When you save the key, give it a different filename from your existing key (for instance, add -emu to the suggested name of the file).
111
+
112
+
1. Add the new ssh key to your {% data variables.enterprise.prodname_managed_user %}. See [AUTOTITLE](/authentication/connecting-to-github-with-ssh/adding-a-new-ssh-key-to-your-github-account#adding-a-new-ssh-key-to-your-account)
113
+
114
+
1. Configure your SSH Config File `~/.ssh/config` to use the different keys. For example, if your personal SSH key is `~/.ssh/id_ed25519` and your {% data variables.enterprise.prodname_emu_enterprise %} SSH key is `~/.ssh/id_ed25519-emu`
115
+
116
+
```text copy
117
+
Host github.com
118
+
IdentityFile ~/.ssh/id_ed25519
119
+
IdentitiesOnly yes
120
+
121
+
Host github-emu.com
122
+
Hostname github.com
123
+
IdentityFile ~/.ssh/id_ed25519-emu
124
+
IdentitiesOnly yes
125
+
```
126
+
127
+
> [!NOTE]
128
+
> The `IdentitiesOnly` line ensures that if the ssh-agent has loaded multiple keys, ssh uses the correct key when connecting.
129
+
130
+
1. Test your SSH configuration by running the following command to connect using the SSH key associated with your personal account - see [AUTOTITLE](/authentication/connecting-to-github-with-ssh/testing-your-ssh-connection) for further details
131
+
132
+
```shell copy
133
+
ssh -T git@github.com
134
+
```
135
+
136
+
Test to see if you can connect to ({% data variables.product.github %}) using your {% data variables.enterprise.prodname_emu_enterprise %} SSH key
137
+
138
+
```shell copy
139
+
ssh -T git@github-emu.com
140
+
```
141
+
142
+
1. Tell `git` to use the correct key when downloading or uploading a repository in an {% data variables.enterprise.prodname_emu_org %}.
143
+
To list the organizations in your {% data variables.enterprise.prodname_emu_enterprise %},
144
+
{% data reusables.profile.access_org %}
145
+
1. For each organization listed tell `git` to use the `github-emu.com` host.
146
+
147
+
For example, if one of your organizations is called `octocat-emu`then to tell `git` to use the host `github-emu.com`forrepositoriesin the `octocat-emu` organization, run the following command
Now, when you clone a repository using SSH, in the `octocat-emu` organization, `git` will use the SSH key associated with your {% data variables.enterprise.prodname_emu_enterprise %} instead of your personal key.
154
+
104
155
## Next steps
105
156
106
157
For reference information, see [AUTOTITLE](/account-and-profile/reference/personal-account-reference).
*[Update code and open a PR](https://github.com/settings/personal-access-tokens/new?name=Core-loop+token&description=Write%20code%20and%20push%20it%20to%20main%21%20Includes%20permission%20to%20edit%20workflow%20files%20for%20Actions%20-%20remove%20%60workflows%3Awrite%60%20if%20you%20don%27t%20need%20to%20do%20that&contents=write&pull_requests=write&workflows=write)
146
146
*[Manage Copilot licenses in an organization](https://github.com/settings/personal-access-tokens/new?name=Core-loop+token&description=Enable%20or%20disable%20copilot%20access%20for%20users%20with%20the%20Seat%20Management%20APIs%3A%20https%3A%2F%2Fdocs.github.com%2Frest%2Fcopilot%2Fcopilot-user-management%0ABe%20sure%20to%20select%20an%20organization%20for%20your%20resource%20owner%20below%21&organization_copilot_seat_management=write)<!-- markdownlint-disable-line search-replace Custom rule -->
Copy file name to clipboardExpand all lines: content/code-security/concepts/code-scanning/about-code-scanning-alerts.md
+11-8Lines changed: 11 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -113,14 +113,6 @@ The severity level for a {% data variables.product.prodname_code_scanning %} ale
113
113
114
114
When an alert has a security severity level, {% data variables.product.prodname_code_scanning %} displays and uses this level in preference to the `severity`. Security severity levels follow the industry-standard Common Vulnerability Scoring System (CVSS) that is also used for advisories in the {% data variables.product.prodname_advisory_database %}. For more information, see [CVSS: Qualitative Severity Rating Scale](https://www.first.org/cvss/v3.1/specification-document#Qualitative-Severity-Rating-Scale).
115
115
116
-
### Pull request check failures for {% data variables.product.prodname_code_scanning %} alerts
117
-
118
-
You can use rulesets to prevent pull requests from being merged when one of the following conditions is met:
119
-
120
-
{% data reusables.code-scanning.merge-protection-rulesets-conditions %}
121
-
122
-
For more information, see [AUTOTITLE](/code-security/code-scanning/managing-your-code-scanning-configuration/set-code-scanning-merge-protection). For more general information about rulesets, see [AUTOTITLE](/repositories/configuring-branches-and-merges-in-your-repository/managing-rulesets/about-rulesets).
123
-
124
116
### Calculation of security severity levels
125
117
126
118
When a security query is added to the {% data variables.product.prodname_codeql %} Default or Extended query suite, the {% data variables.product.prodname_codeql %} engineering team calculates the security severity as follows.
@@ -131,3 +123,14 @@ When a security query is added to the {% data variables.product.prodname_codeql
131
123
1. When displaying alerts found by the query, translate the numerical scores to `Critical`, `High`, `Medium`, or `Low` using the CVSS definitions.
132
124
133
125
For more information, see [{% data variables.product.prodname_codeql %} CWE coverage](https://codeql.github.com/codeql-query-help/codeql-cwe-coverage/) on the {% data variables.product.prodname_codeql %} documentation site.
126
+
127
+
## About alerts in pull requests
128
+
129
+
{% data variables.product.prodname_code_scanning_caps %} alerts can appear on pull requests as check results and annotations. This happens in repositories where {% data variables.product.prodname_code_scanning %} either:
130
+
131
+
* Is configured as a pull request check (by default, this is limited to pull requests that target the default branch)
132
+
* Is configured to scan each time code is pushed (the results are mapped to any open pull requests)
133
+
134
+
You will only see an alert in a pull request if **all** the lines of code identified by the alert exist in the pull request diff.
135
+
136
+
Depending on branch protection rules, the "{% data variables.product.prodname_code_scanning_caps %} results" check may be a required check that prevents pull requests from being merged until it passes.
Copy file name to clipboardExpand all lines: content/code-security/concepts/vulnerability-reporting-and-management/about-your-exposure-to-vulnerabilities-in-your-code-and-in-dependencies.md
+13-11Lines changed: 13 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
2
title: About exposure to vulnerabilities in your code and in dependencies
3
3
shortTitle: Vulnerability exposure
4
-
intro: Understanding your organization’s exposure to vulnerabilities in first-party code and in all dependencies is essential for enabling you to efficiently assess, prioritize, and remediate vulnerabilities, reducing the likelihood of security breaches.
4
+
intro: Understand how vulnerabilities in your own code and in third-party dependencies contribute to your organization’s overall security exposure, and how to measure and reduce that risk.
5
5
allowTitleToDifferFromFilename: true
6
6
product: '{% data reusables.gated-features.ghas-billing %}'
Your organization has exposure to vulnerabilities in both the code you write and maintain, and in the open-source or third-party dependencies your code uses. Assessing your exposure to vulnerable dependencies is crucial if you want to prevent:
22
+
Your organization has exposure to vulnerabilities in both the code you write and maintain, and in the opensource or third-party dependencies your code uses. Assessing your exposure to vulnerabilities is crucial if you want to prevent:
23
23
24
24
***Unplanned downtime and operational disruption**. Exploitation of vulnerabilities can result in application outages, degraded service quality, or cascading failures in critical systems, disrupting your business operations.
25
25
@@ -31,7 +31,7 @@ Your organization has exposure to vulnerabilities in both the code you write and
31
31
32
32
***Regulatory and licensing issues**. Many regulations and industry standards require organizations to proactively address known vulnerabilities in their software supply chain. Failing to remediate vulnerable dependencies can result in non-compliance, audits, legal penalties, or breaches of open source license obligations.
33
33
34
-
Regularly assessing your exposure to vulnerabilities is good practice to help identify risks early, implement effective remediation strategies, and maintain resilient, trustworthy software.
## Ways to monitor your repositories for vulnerable code
37
37
@@ -41,17 +41,19 @@ Regularly assessing your exposure to vulnerabilities is good practice to help id
41
41
42
42
{% data variables.product.github %} provides a comprehensive set of {% data variables.product.prodname_dependabot %} metrics to help you monitor, prioritize, and remediate these risks across all repositories in your organization. See [AUTOTITLE](/code-security/concepts/supply-chain-security/about-metrics-for-dependabot-alerts).
43
43
44
-
## Key tasks for AppSec managers
44
+
## Reducing organizational vulnerability exposure
45
45
46
-
### 1. Monitor vulnerability metrics for dependencies
46
+
Reducing organizational vulnerability exposure requires ongoing visibility into risk, remediation progress, and policy enforcement across repositories. {% data variables.product.prodname_dependabot %} and {% data variables.product.prodname_code_scanning %} metrics provide this visibility. Use the following best practices to monitor and reduce your organization's vulnerability exposure:
47
+
48
+
### Monitor vulnerability metrics for dependencies
47
49
48
50
Use the metrics overview for {% data variables.product.prodname_dependabot %} to gain visibility into the current state of your organization's dependency vulnerabilities. See [AUTOTITLE](/code-security/security-overview/viewing-metrics-for-dependabot-alerts).
49
51
50
52
***Alert prioritization:** Review the number of open {% data variables.product.prodname_dependabot_alerts %} and use filters such as CVSS severity, EPSS exploit likelihood, patch availability, and whether a vulnerable dependency is actually used in deployed artifacts. {% data reusables.security-overview.dependabot-filters-link %}
51
53
***Repository-level breakdown:** Identify which repositories have the highest number of critical or exploitable vulnerabilities.
52
54
***Remediation tracking:** Track the number and percentage of alerts fixed over time to measure the effectiveness of your vulnerability management program.
53
55
54
-
### 2. Monitor introduction of new {% data variables.product.prodname_code_scanning %} alerts
56
+
### Monitor introduction of new {% data variables.product.prodname_code_scanning %} alerts
55
57
56
58
Use the alert view for {% data variables.product.prodname_code_scanning %} to gain visibility into remediation activity in your organization's pull requests. See [AUTOTITLE](/code-security/security-overview/viewing-metrics-for-pull-request-alerts).
57
59
@@ -60,7 +62,7 @@ Use the alert view for {% data variables.product.prodname_code_scanning %} to ga
60
62
***Repository-level breakdown:** Identify which repositories have the highest number of alerts detected in pull requests but still merged into the default branch.
61
63
***Remediation tracking:** Track the number and percentage of alerts fixed over time to measure the effectiveness of your vulnerability management program.
62
64
63
-
### 3. Prioritize remediation efforts
65
+
### Prioritize remediation efforts
64
66
65
67
Focus on vulnerabilities that present the highest risk to your organization.
66
68
@@ -69,20 +71,20 @@ Focus on vulnerabilities that present the highest risk to your organization.
69
71
* Encourage development teams to address vulnerabilities that are actually used in deployed artifacts through repository custom properties and using production context. See [AUTOTITLE](/code-security/securing-your-organization/understanding-your-organizations-exposure-to-vulnerabilities/alerts-in-production-code).{% endif %}{% ifversion security-campaigns %}
70
72
* Create security campaigns to encourage and track the remediation of high priority {% data variables.product.prodname_code_scanning %} alerts. See [AUTOTITLE](/code-security/securing-your-organization/fixing-security-alerts-at-scale/creating-managing-security-campaigns).{% endif %}
71
73
72
-
### 4. Communicate risk and progress
74
+
### Communicate risk and progress
73
75
74
76
* Use the metrics pages to communicate key risk factors and remediation progress to stakeholders.
75
77
* Provide regular updates on trends, such as the reduction in open critical vulnerabilities or improvements in remediation rates.
76
78
* Highlight repositories or teams that require additional support or attention.
77
79
78
-
### 5. Establish and enforce policies
80
+
### Establish and enforce policies
79
81
80
82
* Set an organization-wide security configuration that enables {% data variables.product.prodname_dependabot %} and {% data variables.product.prodname_code_scanning %} on all existing and new repositories. See [AUTOTITLE](/code-security/securing-your-organization/introduction-to-securing-your-organization-at-scale/about-enabling-security-features-at-scale).
81
83
* Enable dependency review to comment on pull requests in all repositories.
82
84
* Create an organization-wide ruleset to protect the default branch and require critical {% data variables.product.prodname_code_scanning %} alerts to be fixed before a pull request can be merged. See [AUTOTITLE](/organizations/managing-organization-settings/managing-rulesets-for-repositories-in-your-organization).
83
85
* Work with repository administrators to enable automated security updates where possible. See [AUTOTITLE](/code-security/dependabot/dependabot-security-updates/about-dependabot-security-updates).
84
86
85
-
### 6. Assess the impact of alerts
87
+
### Assess the impact of alerts
86
88
87
89
* Regularly review how {% data variables.product.prodname_dependabot %} and {% data variables.product.prodname_code_scanning %} alerts are helping to block security vulnerabilities from entering your codebase.
88
90
* Use historical data to demonstrate the value of proactive dependency management.
0 commit comments