Assessing the security risk of your code
You can use security overview to see which teams and repositories are affected by security alerts, and identify repositories for urgent remedial action.
Who can use this feature?
Access requires:
- Organization views:write access to repositories in the organization
- Enterprise views: organization owners and security managers
Organizations owned by a GitHub Team account with GitHub Secret Protection or GitHub Code Security, or owned by a GitHub Enterprise account
In this article
Exploring the security risks in your code
You can use the different views on yourSecurity tab to explore the security risks in your code.
- Overview: use to explore trends inDetection,Remediation, andPrevention of security alerts.
- Risk: use to explore the current state of repositories, across all alert types.
- Assessments: use to explore the current state of repositories, for secret leaks specifically
- Alerts views: use to explore code scanning, Dependabot, or secret scanning alerts in greater detail.
These views provide you with the data and filters to:
- Assess the landscape of security risk of code stored in all your repositories.
- Identify the highest impact vulnerabilities to address.
- Monitor your progress in remediating potential vulnerabilities.
- Understand how your organization is affected by secret leaks and exposures.
- Export your current selection of data for further analysis and reporting.
For information about theOverview, seeViewing security insights.
Viewing organization-level security risks in code
On GitHub, navigate to the main page of the organization.
Under your organization name, click Security.
To display the "Security risk" view, in the sidebar, click Risk.
Use options in the page summary to filter results to show the repositories you want to assess. The list of repositories and metrics displayed on the page automatically update to match your current selection. For more information on filtering, seeFiltering alerts in security overview.
- Use theTeams dropdown to show information only for the repositories owned by one or more teams.
- ClickNUMBER affected orNUMBER unaffected in the header for any feature to show only the repositories with open alerts or no open alerts of that type.
- Click any of the descriptions of "Open alerts" in the header to show only repositories with alerts of that type and category. For example,1 critical to show the repository with a critical alert for Dependabot.
- At the top of the list of repositories, clickNUMBER Archived to show only repositories that are archived.
- Click in the search box to add further filters to the repositories displayed.
Note
The set of unaffected repositories includes all repositories without open alerts and also any repositories where the security feature is not enabled.
Optionally, use the sidebar on the left to explore alerts for a specific security feature in greater detail. On each page, you can use filters that are specific to that feature to refine your search. For more information about the available qualifiers, seeFiltering alerts in security overview.
Optionally, use the Export CSV button to download a CSV file of the data currently displayed on the page for security research and in-depth data analysis. For more information, seeExporting data from security overview.
Note
The summary views ("Overview", "Coverage" and "Risk") show data only for default alerts. Secret scanning alerts for ignored directories and non-provider alerts are all omitted from these views. Consequently, the individual alert views may include a larger number of open and closed alerts.
Viewing enterprise-level security risks in code
You can view data for security alerts across organizations in an enterprise.
Tip
You can use theowner
filter in the search field to filter the data by organization. For more information, seeFiltering alerts in security overview.
Navigate to GitHub Enterprise Cloud.
In the top-right corner of GitHub, click your profile picture, then clickYour enterprises.
In the list of enterprises, click the enterprise you want to view.
On the left side of the page, in the enterprise account sidebar, click Code Security.
To display the "Security risk" view, in the sidebar, click Risk.
Use options in the page summary to filter results to show the repositories you want to assess. The list of repositories and metrics displayed on the page automatically update to match your current selection. For more information on filtering, seeFiltering alerts in security overview.
- Use theTeams dropdown to show information only for the repositories owned by one or more teams.
- ClickNUMBER affected orNUMBER unaffected in the header for any feature to show only the repositories with open alerts or no open alerts of that type.
- Click any of the descriptions of "Open alerts" in the header to show only repositories with alerts of that type and category. For example,1 critical to show the repository with a critical alert for Dependabot.
- At the top of the list of repositories, clickNUMBER Archived to show only repositories that are archived.
- Click in the search box to add further filters to the repositories displayed.
Note
The set of unaffected repositories includes all repositories without open alerts and also any repositories where the security feature is not enabled.
Optionally, use the sidebar on the left to explore alerts for a specific security feature in greater detail. On each page, you can use filters that are specific to that feature to refine your search. For more information about the available qualifiers, seeFiltering alerts in security overview.
Optionally, use theExport CSV button to download a CSV file of the data currently displayed on the page for security research and in-depth data analysis. For more information, seeExporting data from security overview.
Note
The summary views ("Overview", "Coverage" and "Risk") show data only for default alerts. Secret scanning alerts for ignored directories and non-provider alerts are all omitted from these views. Consequently, the individual alert views may include a larger number of open and closed alerts.
Next steps
When you have assessed your security risks, you are ready to create a security campaign to collaborate with developers to remediate alerts. For information about fixing security alerts at scale, seeCreating and managing security campaigns andBest practices for fixing security alerts at scale.