About security overview
You can gain insights into the overall security landscape of your organization or enterprise and identify repositories that require intervention using security overview.
Who can use this feature?
Secret risk assessment is available for all organizations owned by GitHub Team or GitHub Enterprise. Additional views are available for:
- Organizations owned by a GitHub Team account with GitHub Secret Protection or GitHub Code Security
- Organizations owned by a GitHub Enterprise account
In this article
Security overview provides insights into the security of code stored in repositories in your organization.
- All organizations on GitHub Team can use the freesecret risk assessment to evaluate the exposure of their organization to leaked secrets, seeViewing the secret risk assessment report for your organization.
- GitHub Team accounts that purchaseGitHub Secret Protection or GitHub Code Security have access to views with additional insights.
The information below describes the views available to organizations with GitHub Secret Protection or GitHub Code Security that you can use to identify trends in detection, remediation, and prevention of security alerts and dig deep into the current state of your repositories.
About the views
Note
All views show information and metrics for thedefault branches of the repositories you have permission to view in an organization or enterprise.
The views are interactive with filters that allow you to look at the aggregated data in detail and identify sources of high risk, see security trends, and see the impact of pull request analysis on blocking security vulnerabilities entering your code. As you apply multiple filters to focus on narrower areas of interest, all data and metrics across the view change to reflect your current selection. For more information, seeFiltering alerts in security overview.
From security overview, you can download comma-separated values (CSV) files containing data from several pages of your organization or enterprise's security overview. These files can be used for efforts like security research and in-depth data analysis, and can integrate easily with external datasets. For more information, seeExporting data from security overview.
There are dedicated views for each type of security alert. You can limit your analysis to a specific type of alert, and then narrow the results further with a range of filters specific to each view. For example, in the secret scanning alert view, you can use the "Secret type" filter to view only secret scanning alerts for a specific secret, like a GitHub personal access token.
Note
Security overview displays active alerts raised by security features. If there are no alerts shown in security overview for a repository, undetected security vulnerabilities or code errors may still exist or the feature may not be enabled for that repository.
About security overview for organizations
The application security team at your company can use the different views for both broad and specific analyses of your organization's security status. For example, the team can use the "Overview" dashboard view to track your organization's security landscape and progression.
You can find security overview on theSecurity tab for any organization. Each view shows a summary of the data that you have access to. As you add filters, all data and metrics across the view change to reflect the repositories or alerts that you've selected. For information about permissions, seePermission to view data in security overview.
Security overview has multiple views that provide different ways to explore enablement and alert data.
- Overview: visualize trends inDetection,Remediation, andPrevention of security alerts, seeViewing security insights.
- Risk and Alert views: explore the risk from security alerts of all types or focus on a single alert type and identify your risk from specific vulnerable dependencies, code weaknesses, or leaked secrets, seeAssessing the security risk of your code.
- Coverage: assess the adoption of security features across repositories in the organization, seeAssessing adoption of security features.
- Assessments: regardless of the enablement status of Advanced Security features, organizations on GitHub Team and GitHub Enterprise can run a free report to scan the code in the organization for leaked secrets, seeAbout the secret risk assessment.
- Enablement trends: see how quickly different teams are adopting security features.
- CodeQL pull request alerts: assess the impact of running CodeQL on pull requests and how development teams are resolving code scanning alerts, seeViewing metrics for pull request alerts.
- Secret scanning: find out which types of secret are blocked by push protection and which teams are bypassing push protection, seeViewing metrics for secret scanning push protection andReviewing requests to bypass push protection.
You also create and manage security campaigns to remediate alerts from security overview, seeCreating and managing security campaigns andBest practices for fixing security alerts at scale.
About security overview for enterprises
You can find security overview on theSecurity tab for your enterprise. Each page displays aggregated and repository-specific security information for your enterprise.
As with security overview for organizations, security overview for enterprises has multiple views that provide different ways to explore data.
For information about permissions, seePermission to view data in security overview.
Permission to view data in security overview
Organization-level overview
If you are anowner or security manager for an organization, you can see data for all the repositories in the organization in all views.
If you are anorganization or team member, you can view security overview for the organization and see data for repositories where you have an appropriate level of access.
Tip
The Assessments view, which is not shown in the table below, is only available to organization owners and security managers.
Organization or team member with | Overview dashboard view | Risk and alerts views | Coverage view |
---|---|---|---|
admin access for one or more repositories | View data for those repositories | View data for those repositories | View data for those repositories |
write access for one or more repositories | View code scanning and Dependabot data for those repositories | View code scanning and Dependabot data for those repositories | No access |
read ortriage access for one or more repositories | No access | No access | No access |
Security alert access for one or more repositories | View all security alert data for those repositories | View all security alert data for those repositories | No access |
Custom organization role with permission to view one or more types of security alert | View allowed alert data for all repositories | View allowed alert data for all repositories in all views | No access |
Note
To ensure a consistent and responsive experience, for organization members, the organization-level security overview pages will only display results from the most recently updated 3,000 repositories. If your results have been restricted, a notification will appear at the top of the page. Organization owners and security managers will see results from all repositories.
For more information about access to security alerts and related views, seeManaging security and analysis settings for your repository andAbout custom repository roles.
Enterprise-level overview
Note
If you are anenterprise owner, you will need to join an organization as an organization owner to view data for the organization's repositories in both the organization-level and enterprise-level overview. For more information, seeManaging your role in an organization owned by your enterprise.
In the enterprise-level security overview, you can see data for all organizations where you are anorganization owner or security manager.