You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Thanks for joining our GitHub Advanced Security webinar on April 16th! Whether you attended live or are catching up afterward, this post is your go-to guide for taking the next steps to proactively identify secret exposure and strengthen your organization's security posture.
🎯 Your #1 Next Step: Run a Secret Risk Assessment
The single most impactful action you can take right now is to run a secret risk assessment for your organization. This gives you immediate visibility into exposed secrets across your repositories, no configuration required.
Q: How do I enable secret scanning for my organization?
A: Organization owners can enable secret scanning across all repositories from the organization's security settings. You can also enable it per-repository.
Q: What's the difference between secret scanning and push protection?
A: Secret scanning detects secrets that are already in your repositories. Push protection goes a step further by preventing secrets from being committed in the first place.
Q: Can I see which repositories have the most risk?
A: Yes! The secret risk assessment and the Security Overview dashboard give you org-wide visibility to prioritize where to focus your remediation efforts.
💬 Keep the Conversation Going
Have questions about implementing GHAS, running your secret risk assessment, or rolling out security features across your org? Drop them in the comments below! 👇
Code ScanningCode scanning: our code analysis features, powered by the CodeQL engineSecret ScanningDetect and prevent the exposure of sensitive information in your codeCode SecurityBuild security into your GitHub workflow with features to keep your codebase secureGHASDiscussions related to GitHub Advanced SecuritySecret ManagementSecret mgmt: store/use/rotate secrets safely (scope, OIDC, vaults).source:uiDiscussions created via Community GitHub templatesSecret ProtectionSecret Protection prevents exposures, protects credentials, and allows you to ship securely
1 participant
Heading
Bold
Italic
Quote
Code
Link
Numbered list
Unordered list
Task list
Attach files
Mention
Reference
Menu
reacted with thumbs up emoji reacted with thumbs down emoji reacted with laugh emoji reacted with hooray emoji reacted with confused emoji reacted with heart emoji reacted with rocket emoji reacted with eyes emoji
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
Thanks for joining our GitHub Advanced Security webinar on April 16th! Whether you attended live or are catching up afterward, this post is your go-to guide for taking the next steps to proactively identify secret exposure and strengthen your organization's security posture.
🎯 Your
#1Next Step: Run a Secret Risk AssessmentThe single most impactful action you can take right now is to run a secret risk assessment for your organization. This gives you immediate visibility into exposed secrets across your repositories, no configuration required.
👉 Run a Secret Risk Assessment
🚀 Key Takeaways from the Webinar
Here's a recap of what we covered:
1. Secret Scanning
2. Secret Risk Assessment
3. Code Scanning
4. Best Practices for Rolling Out GHAS
📚 Resources to Keep Going
❓ FAQ from the Webinar
Q: How do I enable secret scanning for my organization?
A: Organization owners can enable secret scanning across all repositories from the organization's security settings. You can also enable it per-repository.
Q: What's the difference between secret scanning and push protection?
A: Secret scanning detects secrets that are already in your repositories. Push protection goes a step further by preventing secrets from being committed in the first place.
Q: Can I see which repositories have the most risk?
A: Yes! The secret risk assessment and the Security Overview dashboard give you org-wide visibility to prioritize where to focus your remediation efforts.
💬 Keep the Conversation Going
Have questions about implementing GHAS, running your secret risk assessment, or rolling out security features across your org? Drop them in the comments below! 👇
You can also explore the Code Security Community.
We're excited to see you take the next step in securing your code. Remember, the best time to run a secret risk assessment is today! 🛡️
Beta Was this translation helpful? Give feedback.
All reactions