Skip to content

Commit 8a3978b

Browse files
Merge branch 'main' into gem-clarification-reusable
2 parents 1aaf9b2 + 374acd2 commit 8a3978b

File tree

68 files changed

+63213
-14709
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

68 files changed

+63213
-14709
lines changed

content/actions/how-tos/secure-your-work/security-harden-deployments/oidc-in-jfrog.md

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -55,6 +55,8 @@ In your {% data variables.product.prodname_actions %} workflow file, ensure you
5555

5656
The following example uses the placeholders `YOUR_PROVIDER_NAME` and `YOUR_AUDIENCE`.
5757

58+
{% raw %}
59+
5860
```yaml
5961
permissions:
6062
id-token: write
@@ -77,13 +79,17 @@ jobs:
7779

7880
```
7981

82+
{% endraw %}
83+
8084
> [!TIP]
8185
> When OIDC authentication is used, the `setup-jfrog-cli` action automatically provides `oidc-user` and `oidc-token` as step outputs.
8286
> These can be used for other integrations that require authentication with JFrog.
8387
> To reference these outputs, ensure the step has an explicit `id` defined (for example `id: setup-jfrog-cli`).
8488
8589
### Using OIDC Credentials in other steps
8690

91+
{% raw %}
92+
8793
```yaml
8894
- name: Sign in to Artifactory Docker registry
8995
uses: docker/login-action@v3
@@ -93,6 +99,8 @@ jobs:
9399
password: ${{ steps.setup-jfrog-cli.outputs.oidc-token }}
94100
```
95101
102+
{% endraw %}
103+
96104
## Further reading
97105
98106
* [OpenID Connect Integration](https://jfrog.com/help/r/jfrog-platform-administration-documentation/openid-connect-integration) in the JFrog documentation

content/authentication/keeping-your-account-and-data-secure/about-authentication-to-github.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -74,7 +74,7 @@ If you need to use multiple accounts on {% data variables.location.product_locat
7474

7575
### Session cookies
7676

77-
{% data variables.product.company_short %} uses cookies to provide services and increase security. {% ifversion fpt or ghec %}You can review details about {% data variables.product.company_short %}'s cookies in the [privacy/cookies repository](https://github.com/privacy/cookies).{% endif %}
77+
{% data variables.product.company_short %} uses cookies to provide services and increase security. {% ifversion fpt or ghec %}You can review details about {% data variables.product.company_short %}'s cookies in [AUTOTITLE](/free-pro-team@latest/site-policy/privacy-policies/github-cookies).{% endif %}
7878

7979
* The gist.{% ifversion fpt or ghec %}github.com{% elsif ghes %}HOSTNAME domain{% endif %} and {% ifversion fpt or ghec %}github.com domains{% elsif ghes %}base domain for your instance{% endif %} use separate cookies.
8080
* {% data variables.product.github %} typically marks a user session for deletion after two weeks of inactivity.

content/authentication/securing-your-account-with-two-factor-authentication-2fa/about-mandatory-two-factor-authentication.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -53,7 +53,7 @@ Currently, we don't support passkeys or security keys as primary 2FA methods sin
5353
* [About email verification and mandatory 2FA](#about-email-verification-and-mandatory-2fa)
5454

5555
> [!NOTE]
56-
> We recommend retaining cookies on {% data variables.product.prodname_dotcom_the_website %}. If you set your browser to wipe your cookies every day, you'll never have a verified device for account recovery purposes, as the [`_device_id` cookie](https://github.com/privacy/cookies) is used to securely prove you've used that device previously. For more information, see [AUTOTITLE](/authentication/securing-your-account-with-two-factor-authentication-2fa/recovering-your-account-if-you-lose-your-2fa-credentials#authenticating-with-a-verified-device-ssh-token-or-personal-access-token).
56+
> We recommend retaining cookies on {% data variables.product.prodname_dotcom_the_website %}. If you set your browser to wipe your cookies every day, you'll never have a verified device for account recovery purposes, as the [`_device_id` cookie](/free-pro-team@latest/site-policy/privacy-policies/github-cookies) is used to securely prove you've used that device previously. For more information, see [AUTOTITLE](/authentication/securing-your-account-with-two-factor-authentication-2fa/recovering-your-account-if-you-lose-your-2fa-credentials#authenticating-with-a-verified-device-ssh-token-or-personal-access-token).
5757
5858
### About TOTP apps and mandatory 2FA
5959

content/code-security/index.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5,13 +5,13 @@ intro: 'Build security into your {% data variables.product.github %} workflow to
55
redirect_from:
66
- /code-security/guides
77
introLinks:
8-
overview: /code-security/getting-started/github-security-features
9-
try_ghas_for_free: '{% ifversion ghec %}/billing/how-tos/products/trial-advanced-security{% endif %}'
10-
generate_secret_risk_assessment_report_for_free: '{% ifversion secret-risk-assessment %}/code-security/securing-your-organization/understanding-your-organizations-exposure-to-leaked-secrets/viewing-the-secret-risk-assessment-report-for-your-organization{% endif %}'
8+
overview: '{% ifversion ghes %}/code-security/getting-started/github-security-features{% endif %}'
9+
generate_secret_risk_assessment_report_for_free: '{% ifversion secret-risk-assessment %}/code-security/securing-your-organization/understanding-your-organizations-exposure-to-leaked-secrets/viewing-the-secret-risk-assessment-report-for-your-organization#generating-an-initial-secret-risk-assessment{% endif %}'
1110
featuredLinks:
1211
startHere: # Links aimed at the builder audience
12+
- '{% ifversion fpt or ghec %}/code-security/getting-started/github-security-features{% endif %}'
1313
- /code-security/getting-started/quickstart-for-securing-your-repository
14-
- /code-security/secret-scanning/working-with-secret-scanning-and-push-protection
14+
- '{% ifversion ghes %}/code-security/secret-scanning/working-with-secret-scanning-and-push-protection{% endif %}'
1515
- /code-security/getting-started/dependabot-quickstart-guide
1616
- /code-security/code-scanning/enabling-code-scanning/configuring-default-setup-for-code-scanning
1717
guideCards:

content/code-security/secret-scanning/introduction/about-secret-scanning.md

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,10 @@
11
---
22
title: About secret scanning
33
intro: '{% data variables.product.github %} scans repositories for known types of secrets, to prevent fraudulent use of secrets that were committed accidentally.'
4-
product: '{% data reusables.gated-features.secret-scanning %}'
4+
product: |
5+
{% data reusables.gated-features.secret-scanning %}{% ifversion secret-risk-assessment %}
6+
7+
{% data variables.secret-scanning.secret-risk-assessment-cta-product %}{% endif %}
58
redirect_from:
69
- /github/administering-a-repository/about-token-scanning
710
- /articles/about-token-scanning
@@ -30,7 +33,9 @@ shortTitle: Secret scanning
3033

3134
{% ifversion ghas-products %}{% ifversion secret-risk-assessment %}
3235
> [!TIP]
33-
> Regardless of the enablement status of {% data variables.product.prodname_AS %} features, organizations on {% data variables.product.prodname_team %} and {% data variables.product.prodname_enterprise %} can run a free report to scan the code in the organization for leaked secrets, see [AUTOTITLE](/code-security/securing-your-organization/understanding-your-organizations-exposure-to-leaked-secrets/about-secret-risk-assessment).{% endif %}{% else %}{% endif %}
36+
> Regardless of the enablement status of {% data variables.product.prodname_AS %} features, organizations on {% data variables.product.prodname_team %} and {% data variables.product.prodname_enterprise %} can run a free report to scan the code in the organization for leaked secrets.
37+
>
38+
> To generate a report, open {% data reusables.security-overview.navigate-to-risk-assessment %}.{% endif %}{% else %}{% endif %}
3439
3540
When a supported secret is leaked, {% data variables.product.github %} generates a {% data variables.product.prodname_secret_scanning %} alert. Alerts are reported on the **Security** tab of repositories on {% data variables.product.github %}, where you can view, evaluate, and resolve them. For more information, see [AUTOTITLE](/code-security/secret-scanning/managing-alerts-from-secret-scanning).
3641

content/code-security/securing-your-organization/index.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Securing your organization
33
shortTitle: Secure your organization
4-
intro: 'Secure your organization at scale with {% data variables.product.company_short %}''s security products{% ifversion security-configurations %} through {% data variables.product.prodname_security_configurations %} and {% data variables.product.prodname_global_settings %}{% endif %}.'
4+
intro: 'Secure your organization at scale with {% data variables.product.company_short %}''s security products{% ifversion security-configurations %} through {% data variables.product.prodname_security_configurations %} and {% data variables.product.prodname_global_settings %}{% endif %}.{% ifversion secret-risk-assessment %}<br>{% data variables.secret-scanning.secret-risk-assessment-cta-product %}{% endif %}'
55
versions:
66
fpt: '*'
77
ghec: '*'

content/code-security/securing-your-organization/troubleshooting-security-configurations/a-repository-is-using-advanced-setup-for-code-scanning.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -15,21 +15,21 @@ topics:
1515

1616
## About the problem
1717

18-
You cannot successfully apply a {% data variables.product.prodname_security_configuration %} with {% data variables.product.prodname_code_scanning %} default setup set to "Enabled" to a target repository that uses advanced setup for {% data variables.product.prodname_code_scanning %}. Advanced setups are tailored to the specific security needs of their repositories, so they are not intended to be overridden at scale.
18+
You cannot successfully apply a {% data variables.product.prodname_security_configuration %} with {% data variables.product.prodname_code_scanning %} default setup set to "Enabled" to a target repository that has an active configuration of advanced setup for {% data variables.product.prodname_code_scanning %}. Advanced setups are tailored to the specific security needs of the repositories they are applied to, so they are not intended to be overridden at scale.
19+
20+
### Active advanced setup
1921

2022
If you try to attach a {% data variables.product.prodname_security_configuration %} with {% data variables.product.prodname_code_scanning %} set to "Enabled" to a repository that already uses advanced setup, security settings will be applied as follows:
2123

2224
* **{% data variables.product.prodname_code_scanning_caps %} default setup will not be enabled**, and advanced setup will continue to run as normal.
2325
* **All other security features enabled in the configuration will be enabled.**
2426
* **The {% data variables.product.prodname_security_configuration %} will not be attached** to the repository, since only some features from the configuration are enabled.
2527

26-
For all repositories without an active advanced setup, the {% data variables.product.prodname_security_configuration %} will be applied as expected, and {% data variables.product.prodname_code_scanning %} default setup will be enabled.
28+
### Inactive or absent advanced setup
29+
30+
{% data reusables.code-scanning.inactive-advanced-setup %}
2731

28-
> [!NOTE]
29-
> If advanced setup is considered inactive for a repository, default setup _will_ still be enabled for that repository. Advanced setup is considered inactive for a repository if the repository meets any of the following criteria:
30-
> * The latest {% data variables.product.prodname_codeql %} analysis is more than 90 days old
31-
> * All {% data variables.product.prodname_codeql %} configurations have been deleted
32-
> * The workflow file has been deleted or disabled (exclusively for YAML-based advanced setup)
32+
If there is no advanced setup or the advanced setup is inactive, then default setup is enabled and the {% data variables.product.prodname_security_configuration %} applied as expected.
3333

3434
## Solving the problem
3535

content/code-security/securing-your-organization/troubleshooting-security-configurations/index.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Troubleshooting security configurations
3-
shortTitle: Troubleshooting configurations
3+
shortTitle: Troubleshoot configurations
44
intro: 'To successfully apply a {% data variables.product.prodname_security_configuration %}, you may need to troubleshoot unexpected issues.'
55
versions:
66
feature: security-configurations
@@ -11,6 +11,7 @@ topics:
1111
- Security
1212
children:
1313
- /a-repository-is-using-advanced-setup-for-code-scanning
14+
- /unexpected-default-setup
1415
- /not-enough-github-advanced-security-licenses
1516
- /feature-disappears
1617
---
Lines changed: 33 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,33 @@
1+
---
2+
title: Default setup for code scanning overrides advanced setup
3+
shortTitle: Unexpected default setup
4+
intro: 'You apply a {% data variables.product.prodname_security_configuration %} with "Enabled with advanced setup allowed" and the existing advanced setup for {% data variables.product.prodname_code_scanning %} is ignored in some repositories.'
5+
permissions: '{% data reusables.permissions.security-org-enable %}'
6+
versions:
7+
feature: security-configurations
8+
topics:
9+
- Code Security
10+
- Organizations
11+
- Security
12+
---
13+
14+
## About the problem
15+
16+
When you apply a {% data variables.product.prodname_security_configuration %} and {% data variables.product.prodname_code_scanning %} is defined as "Enabled with advanced setup allowed", each repository is checked to see if there is an existing, active, advanced setup.
17+
18+
* **No change to {% data variables.product.prodname_code_scanning %}** if an **active** advanced setup configuration is detected.
19+
* **Default setup is enabled** for repositories where advanced setup is **inactive or absent**.
20+
21+
### Inactive or absent advanced setup
22+
23+
{% data reusables.code-scanning.inactive-advanced-setup %}
24+
25+
## Solving the problem
26+
27+
This solution has two parts:
28+
29+
1. Any repositories where default setup for {% data variables.product.prodname_code_scanning %} was unexpectedly applied need to run {% data variables.product.prodname_codeql %} analysis at intervals of less than 90 days, for example, once a month.
30+
31+
Even if the repository is not under active development, new vulnerabilities may be identified by updates to {% data variables.product.prodname_codeql %} analysis.
32+
33+
1. Once the affected repositories all have {% data variables.product.prodname_codeql %} analysis running, you can reapply the {% data variables.product.prodname_security_configuration %}.

content/code-security/securing-your-organization/understanding-your-organizations-exposure-to-leaked-secrets/about-secret-risk-assessment.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: 'About the secret risk assessment'
33
shortTitle: 'Secret risk assessment'
44
intro: 'Learn why it''s so important to understand your organization''s exposure to data leaks and how the {% data variables.product.prodname_secret_risk_assessment %} report gives an overview of your organization’s secret leak footprint.'
5-
product: '{% data reusables.gated-features.secret-risk-assessment-report %}'
5+
product: '{% data reusables.gated-features.secret-risk-assessment-report %}<br>{% data variables.secret-scanning.secret-risk-assessment-cta-product %}'
66
allowTitleToDifferFromFilename: true
77
type: overview
88
versions:
@@ -19,7 +19,7 @@ topics:
1919

2020
Assessing your exposure to leaked secrets is crucial if you want to prevent:
2121

22-
* **Exploitation by bad actors**. Malicious actors can use leaked secrets such as API keys, passwords, and tokens to gain unauthorized access to systems, databases, and sensitive information. Leaked secrets can lead to data breaches, compromising user data and potentially causing significant financial and reputational damage. See industry examples and in-depth discussion in [Understanding your organization's exposure to secret leaks](https://resources.github.com/enterprise/understanding-secret-leak-exposure) in {% data variables.product.github %} Executive Insights.
22+
* **Exploitation by bad actors**. Malicious actors can use leaked secrets such as API keys, passwords, and tokens to gain unauthorized access to systems, databases, and sensitive information. Leaked secrets can lead to data breaches, compromising user data and potentially causing significant financial and reputational damage.
2323

2424
* **Regulatory problems**. Many industries have strict regulatory requirements for data protection, and leaked secrets can result in non-compliance with regulations, leading to legal penalties and fines.
2525

@@ -29,7 +29,7 @@ Assessing your exposure to leaked secrets is crucial if you want to prevent:
2929

3030
* **Costly fallout**. Addressing the fallout from leaked secrets can be costly, involving incident response efforts, security audits, and potential compensation for affected parties.
3131

32-
Regularly assessing your exposure to leaked secrets is good practice to help identify vulnerabilities, implement necessary security measures, and ensure that any compromised secrets are promptly rotated and invalidated.
32+
Regularly assessing your exposure to leaked secrets is good practice to help identify vulnerabilities, implement necessary security measures, and ensure that any compromised secrets are promptly rotated and invalidated. See industry examples and in-depth discussion in [Understanding your organization's exposure to secret leaks](https://resources.github.com/enterprise/understanding-secret-leak-exposure) in {% data variables.product.github %} Executive Insights.
3333

3434
## About {% data variables.product.prodname_secret_risk_assessment %}
3535

@@ -60,6 +60,6 @@ Because the {% data variables.product.prodname_secret_risk_assessment %} report
6060

6161
Now that you know about the {% data variables.product.prodname_secret_risk_assessment %} report, you may want to learn how to:
6262

63-
* Generate the report to see your organization risk. See [AUTOTITLE](/code-security/securing-your-organization/understanding-your-organizations-exposure-to-leaked-secrets/viewing-the-secret-risk-assessment-report-for-your-organization).
63+
* Generate the report to see your organization risk. Navigate to {% data reusables.security-overview.navigate-to-risk-assessment %}.
6464
* Interpret the results of the report. See [AUTOTITLE](/code-security/securing-your-organization/understanding-your-organizations-exposure-to-leaked-secrets/interpreting-secret-risk-assessment-results).
6565
* Enable {% data variables.product.prodname_GH_secret_protection %} to improve your secret leak footprint. See [AUTOTITLE](/code-security/securing-your-organization/understanding-your-organizations-exposure-to-leaked-secrets/choosing-github-secret-protection#enabling-secret-protection).

0 commit comments

Comments
 (0)