Enterprise governance and policy improvements for secret scanning
At GitHub, we care deeply about ensuring enterprise-readiness of our products. From recent improvements including enterprise-level delegated bypass controls for push protection, to support for the new Enterprise Security Manager role, secret scanning is no exception.
Today, we’re announcing additional recent improvements to alert-level and enterprise-level permissions for secret scanning. With these improvements, we’re unlocking more ways to scale governance and policy across GitHub, enhancing the ability for enterprises to more easily manage secret scanning alerts, custom patterns, and push protection bypasses.
Permissions for secret scanning alert assignees
We’ve expanded permissions for secret scanning alert assignees, in order to make alerts more actionable.
- Assignment for anyone with alert
writepermissions: Added the ability to modify assignees for anyone with the ability to modify/resolve secret scanning alerts. Anyone with the ability to dismiss or reopen a secret scanning alert should be able to add or remove the alert assignment. - Assignees and alert
writepermissions: Added the ability for alert assignees to modify alerts, including resolving the alert and removing themselves as an assignee.
Enterprise owners and enterprise security managers with custom patterns
We’ve made custom pattern management at the enterprise level more permissive; previously, only the pattern creator could edit them.
- Custom pattern management: Enterprise owners and enterprise security managers can now edit any custom patterns, regardless of whether or not they created them. This solves a common pain point with orphaned custom patterns at the enterprise level.
Enterprise teams, roles, and apps with push protection bypasses
We have expanded support for Enterprise teams, organization roles, and GitHub Apps to provide more flexible and secure policy management.
- Delegated push protection bypasses: To better manage push protection bypasses at scale, you can now also delegate push protection bypass permissions to Enterprise Teams, roles, and apps. This streamlines the process for handling bypass requests across the enterprise.
-
Removed 1 actor requirement for bypass lists: Later this month, we’re removing the need to add at least 1 actor to the “push protection bypass list” in security configurations. With this change, customers can use custom roles with the push protection bypass fine-grained permission without needing to provide access to a team or default role.
Learn more about delegated bypasses for push protection, custom patterns, and getting started with secret scanning.