注: プッシュ保護の Secret scanning メトリックは現在ベータ版であり、変更される可能性があります。
About metrics for secret scanning push protection
The metrics overview for secret scanning push protection helps you to understand how well you are preventing security leaks in your organization or across organizations in your enterprise. You can use the metrics to assess how push protection is performing, and to easily identify the repositories where you may need to take action in order to prevent leaks of sensitive information.
The overview shows you a summary of how many pushes containing secrets have been successfully blocked by push protection, as well as how many times push protection was bypassed.
You can also find more granular metrics, such as:
- The secret types that have been blocked or bypassed the most
- The repositories that have had the most pushes blocked
- The repositories that are bypassing push protection the most
- The percentage distribution of reasons that users give when they bypass the protection
Use the date picker to set the time range that you want to view alert activity and metrics for, and click in the search box to add further filters on the alerts and metrics displayed. For more information, see "セキュリティの概要でアラートをフィルター処理する."
You can see secret scanning metrics if you have:
- The
admin
role for the repository. - A custom repository role with the "View secret scanning results" fine-grained permissions for the repository. For more information, see "カスタムリポジトリロールについて."
- Access to alerts for the repository. For more information, see "リポジトリのセキュリティと分析設定を管理する."
The metrics are based on activity from the default period or your selected period.
Viewing metrics for secret scanning push protection for an organization
-
GitHub.com で、Organization のメイン ページへ移動します。
-
組織名の下で、 [ セキュリティ] をクリックします。
-
In the sidebar, under "Metrics", click Secret scanning.
-
Click on an individual secret type or repository to see the associated シークレット スキャンニング アラート for your organization.
-
You can use the options at the top of the page to filter the group of repositories that you want to see secret scanning metrics for.
- Use the date picker to set the time range that you want to view metrics for. Note that the date used by the date picker corresponds to the date a secret was bypassed on.
- Click in the search box to add further filters on the secret scanning metrics displayed. For more information, see "セキュリティの概要でアラートをフィルター処理する."
Viewing metrics for secret scanning push protection for an enterprise
You can view metrics for secret scanning push protection across organizations in an enterprise. セキュリティの概要で示される情報は、リポジトリと Organization へのアクセス権、および GitHub Advanced Security がそれらのリポジトリと Organization によって使われているかどうかによって異なります。 詳しくは、「セキュリティの概要について」を参照してください。
Tip
You can use the owner
filter in the search field to filter the data by organization. If you're an owner of an マネージド ユーザーを含む Enterprise, you can use the owner-type
filter to filter the data by the type of repository owner, so that you can view data from either organization-owned repositories or user-owned repositories. For more information, see "セキュリティの概要でアラートをフィルター処理する."
-
GitHub Enterprise Cloud に移動します。
-
GitHub の右上の自分のプロフィール写真をクリックし、[自分の Enterprise] をクリックします。
-
Enterpriseのリストで、表示したいEnterpriseをクリックしてください。
-
左側のサイドバーで [ コード セキュリティ] をクリックします。
-
In the sidebar, click Secret scanning metrics.
-
Click on an individual secret type or repository to see the associated シークレット スキャンニング アラート for your enterprise.
-
You can use the options at the top of the page to filter the group of repositories that you want to see secret scanning metrics for.
- Use the date picker to set the time range that you want to view metrics for. Note that the date used by the date picker corresponds to the date a secret was bypassed on.
- Click in the search box to add further filters on the secret scanning metrics displayed. For more information, see "セキュリティの概要でアラートをフィルター処理する."