Skip to content

Commit

Permalink
[2023-11-10]: Secret scanning: sort by alert validity on the index vi…
Browse files Browse the repository at this point in the history
…ew [GA] (#45295)

Co-authored-by: mc <[email protected]>
Co-authored-by: Siara <[email protected]>
  • Loading branch information
3 people authored Nov 2, 2023
1 parent 342f065 commit 8420fc2
Show file tree
Hide file tree
Showing 3 changed files with 15 additions and 9 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -35,9 +35,15 @@ shortTitle: Manage secret alerts
{% data reusables.repositories.navigate-to-repo %}
{% data reusables.repositories.sidebar-security %}
1. In the left sidebar, under "Vulnerability alerts", click **{% data variables.product.prodname_secret_scanning_caps %}**.
{% ifversion secret-scanning-validity-check-partner-patterns %}
1. Optionally, to filter by alert validity status, under "{% data variables.product.prodname_secret_scanning_caps %}" select a status in the "Validity" dropdown menu and then click the filter that you would like to apply. Alternatively, filter using the `validity` key in the search field. You can filter alerts by specifying multiple validity statuses as a comma-separated string, for example `validity:active,unknown`. For more information about validity statuses, see "[Validating partner patterns](#validating-partner-patterns)" below.
{% data reusables.secret-scanning.validity-check-partner-patterns-beta %}

{% data reusables.secret-scanning.validity-check-partner-patterns-enabled %}
{% endif %}
1. Under "{% data variables.product.prodname_secret_scanning_caps %}" click the alert you want to view. {% ifversion secret-scanning-validity-check-partner-patterns %}
1. Optionally, to perform a validity check on the token, on the top right-hand side of the alert, click {% octicon "sync" aria-hidden="true" %} **Verify secret**. For more information, see "[Validating partner patterns](#validating-partner-patterns)." <br><br>
{% note %}
{% note %}

**Note:** You can only perform on-demand validity checks for patterns detected in the repository if automatic validity checks have been enabled for the repository. For more information, see "[Allowing validity checks for partner patterns in a repository](/repositories/managing-your-repositorys-settings-and-features/enabling-features-for-your-repository/managing-security-and-analysis-settings-for-your-repository#allowing-validity-checks-for-partner-patterns-in-a-repository)."

Expand Down Expand Up @@ -81,7 +87,7 @@ You can enable automatic validity checks for supported partner patterns in the c

If your repository has validity checks enabled, you can also perform an on-demand validity check for a secret by clicking {% octicon "sync" aria-hidden="true" %} **Verify secret** in the alert view. {% data variables.product.company_short %} will send the pattern to the relevant partner and display the validation status of the secret in the alert view.

You can use the validation status of a leaked secret to help prioritize the secrets needing remediation steps.
You can filter alerts for supported partner patterns by their validation status, and use the status of a leaked secret to help prioritize the secrets needing remediation steps.

{% data reusables.secret-scanning.validity-check-table %}

Expand Down
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
To be able to filter by validity status, you need to have enabled validity checks for partner patterns in a repository, or have organization owners and enterprise administrators enable the feature for all repositories in the organization or enterprise settings. For more information, see "[AUTOTITLE](/repositories/managing-your-repositorys-settings-and-features/enabling-features-for-your-repository/managing-security-and-analysis-settings-for-your-repository#allowing-validity-checks-for-partner-patterns-in-a-repository)," "[AUTOTITLE](/organizations/keeping-your-organization-secure/managing-security-settings-for-your-organization/managing-security-and-analysis-settings-for-your-organization#allowing-validity-checks-for-partner-patterns-in-an-organization)," and "[AUTOTITLE](/admin/code-security/managing-github-advanced-security-for-your-enterprise/managing-github-advanced-security-features-for-your-enterprise#managing-advanced-security-features)."
13 changes: 6 additions & 7 deletions data/reusables/secret-scanning/validity-check-table.md
Original file line number Diff line number Diff line change
@@ -1,7 +1,6 @@
| Validity | Result |
|-------------------------|--------------------------------------------------------------------------------|
| Active secret | {% data variables.product.company_short %} confirmed this secret is active |
| Active secret | {% data variables.product.company_short %} checked with this secret's provider and found that the secret is active |
| Possibly active secret | {% data variables.product.company_short %} does not support validation checks for this token type yet |
| Possibly active secret | {% data variables.product.company_short %} could not verify this secret |
| Secret appears inactive | You should make sure no unauthorized access has already occurred |
| Validity | Status | Result |
|-------------|------------|--------------------------------------------------------------------------------|
| Active secret | `active` | {% data variables.product.company_short %} checked with this secret's provider and found that the secret is active |
| Possibly active secret | `unknown` | {% data variables.product.company_short %} does not support validation checks for this token type yet |
| Possibly active secret | `unknown` | {% data variables.product.company_short %} could not verify this secret |
| Secret inactive | `inactive` | You should make sure no unauthorized access has already occurred |

0 comments on commit 8420fc2

Please sign in to comment.