Skip to main content

Securing your organization

You can use a number of GitHub features to help keep your organization secure.

Organization owners can configure organization security settings.

Introduction

This guide shows you how to configure security features for an organization. Your organization's security needs are unique and you may not need to enable every security feature. For more information, see "GitHub security features."

Some features are available for repositories on all plans. Additional features are available to enterprises that use GitHub Advanced Security. Las características de la GitHub Advanced Security también se habilitan para todos los repositorios públicos de GitHub.com. Para obtener más información, consulta la sección "Acerca de GitHub Advanced Security".

Managing access to your organization

You can use roles to control what actions people can take in your organization. For example, you can assign the security manager role to a team to give them the ability to manage security settings across your organization, as well as read access to all repositories. For more information, see "Roles in an organization."

Creating a default security policy

You can create a default security policy that will display in any of your organization's public repositories that do not have their own security policy. For more information, see "Creating a default community health file."

Managing Las alertas del dependabot and the dependency graph

By default, GitHub detects vulnerabilities in public repositories and generates Las alertas del dependabot and a dependency graph. You can enable or disable Las alertas del dependabot and the dependency graph for all private repositories owned by your organization.

  1. Click your profile photo, then click Organizations.
  2. Click Settings next to your organization.
  3. Click Security & analysis.
  4. Click Enable all or Disable all next to the feature that you want to manage.
  5. Optionally, select Automatically enable for new repositories.

For more information, see "About alerts for vulnerable dependencies," "Exploring the dependencies of a repository," and "Managing security and analysis settings for your organization."

Managing dependency review

Dependency review is an Advanced Security feature that lets you visualize dependency changes in pull requests before they are merged into your repositories. For more information, see "About dependency review."

Dependency review is already enabled for all public repositories. Organizations that use Nube de GitHub Enterprise with Advanced Security can additionally enable dependency review for private and internal repositories. For more information, see the Nube de GitHub Enterprise documentation.

Managing Actualizaciones de seguridad del dependabot

For any repository that uses Las alertas del dependabot, you can enable Actualizaciones de seguridad del dependabot to raise pull requests with security updates when vulnerabilities are detected. You can also enable or disable Actualizaciones de seguridad del dependabot for all repositories across your organization.

  1. Click your profile photo, then click Organizations.
  2. Click Settings next to your organization.
  3. Click Security & analysis.
  4. Click Enable all or Disable all next to Actualizaciones de seguridad del dependabot.
  5. Optionally, select Automatically enable for new repositories.

For more information, see "About Actualizaciones de seguridad del dependabot" and "Managing security and analysis settings for your organization."

Managing Actualizaciones de versión del dependabot

You can enable Dependabot to automatically raise pull requests to keep your dependencies up-to-date. For more information, see "About Actualizaciones de versión del dependabot."

To enable Actualizaciones de versión del dependabot, you must create a dependabot.yml configuration file. For more information, see "Enabling and disabling Dependabot version updates."

Configuring escaneo de secretos

Escaneo de secretos is an Advanced Security feature that scans repositories for secrets that are insecurely stored.

Escaneo de secretos is already enabled for all public repositories. Organizations that use Nube de GitHub Enterprise with Advanced Security can additionally enable escaneo de secretos for private and internal repositories. For more information, see the Nube de GitHub Enterprise documentation.

Configuring escaneo de código

Escaneo de código is an Advanced Security feature that scans code for security vulnerabilities and errors

Escaneo de código is available for all public repositories. Organizations that use Nube de GitHub Enterprise with Advanced Security can additionally use escaneo de código for private and internal repositories.

Escaneo de código is configured at the repository level. For more information, see "Setting up escaneo de código for a repository."

Next steps

You can view, filter, and sort security alerts for repositories owned by your organization in the security overview. For more information, see "About the security overview."

You can view and manage alerts from security features to address dependencies and vulnerabilities in your code. For more information, see "Viewing and updating vulnerable dependencies in your repository," "Managing pull requests for dependency updates," "Managing escaneo de código for your repository," and "Managing alerts from escaneo de secretos."

If you have a security vulnerability, you can create a security advisory to privately discuss and fix the vulnerability. For more information, see "About GitHub Security Advisories" and "Creating a security advisory."