Secret scanning alert assignees, security campaigns are generally available
To help you track and remediate secret scanning alerts more effectively, secret scanning alert assignees and security campaigns are now generally available.
What’s new?
- Notifications: Alert assignees receive email notifications if subscribed to
participating and @mentionsfrom their repository watching settings. Previously, assignees only received email notifications when subscribed toAll eventsorSecurity Alert events. - Campaign list views: Alerts in campaign list views now support the same filters and bulk actions as existing alert lists. You can now also view repository-level campaign list views, which are visible to anyone with permissions to view the repository-level alert list.
- REST API and webhooks: REST API support is now available for viewing and updating secret scanning security campaigns, along with REST API support for viewing, assigning, and unassigning users to a secret scanning alert. Webhooks for alert assignees are also available and are similar to webhooks for pull request and issue assignment.
What are security campaigns?
Secret scanning security campaigns allow you to target specific alerts in your organization, set remediation deadlines, and notify admins and security managers about the campaign. Secret scanning campaigns can be created and published from the security overview dashboard.
What are alert assignees?
Alert assignees make it easier to track and drive remediation efforts for your alerts. You can assign the alert to anyone with write access to the repository. If that user didn’t have access to view the alert at the time they were assigned, they’ll receive permissions to view and edit the alert. If they received permissions by being assigned to the alert, they’ll lose permissions if they are unassigned. Secret scanning alert assignees will be available for GitHub Enterprise Server customers starting with version 3.20.
Learn more about security campaigns and alert assignment for secret scanning alerts.