Skip to content

Domain 7: Configure GitHub Advanced Security tools in GitHub Enterprise (10%) โ€‹

โ† Domain 6 ยท Cheatsheet โ†’

Exam Tip

This domain covers enterprise-level features. You need to know how Security Overview tracks metrics natively, and what enterprise policies can be applied across organizations.


Security Overview โ€‹

The Security Overview dashboard provides a consolidated view of all GHAS feature status and alerts across an organization or enterprise.

What Security Overview Shows โ€‹

  • Which repositories have each GHAS feature enabled (secret scanning, code scanning, Dependabot)
  • Alert counts by severity across all repositories
  • Open vs. closed/fixed alert trends over time
  • Repositories with the most open critical alerts (risk exposure ranking)

Who Can Access Security Overview โ€‹

RoleLevel
Security managersOrganization-level overview
Organization ownersOrganization-level overview
Enterprise ownersEnterprise-wide overview across all organizations

Navigate to: Organization or Enterprise โ†’ Security tab โ†’ Overview

Using Security Overview for Prioritization โ€‹

  1. Filter by severity: Focus on Critical and High alerts first
  2. Filter by feature: Identify repositories with code scanning disabled
  3. Sort by alert count: Find the repositories with the highest vulnerability debt
  4. Track trends: Confirm that alert counts are decreasing over time (remediation is working)

Golden metric

If the exam asks which metric best indicates the efficiency of the security program, the strongest answer is usually MTTR (Mean Time to Remediate).


Metrics and Reporting โ€‹

Key GHAS Metrics to Track โ€‹

MetricWhat it measures
Mean Time to Remediate (MTTR)Average time from alert creation to resolution
Alert volume by severityTotal open alerts per severity level
Fix rate% of alerts resolved vs. dismissed vs. open
Feature coverage% of repositories with each GHAS feature enabled
New alerts per weekRate of new vulnerabilities being introduced

GitHub Advisory Database โ€‹

  • GitHub's vulnerability database powers Dependabot alerts
  • Contains: CVEs from NVD + GitHub-curated advisories (GitHub Security Advisories)
  • Organization security teams can also submit private security advisories for their own repositories

Private Security Advisories โ€‹

Private Security Advisories let maintainers and security teams:

  • Discuss a vulnerability privately before public disclosure
  • Collaborate on the fix, affected versions, and release plan
  • Coordinate responsible disclosure and eventual publication as a security advisory

This is a favorite exam topic because it tests private collaborative triage, not just alert viewing.


Enterprise Policies โ€‹

Enterprise owners can enforce GHAS policies across all organizations within the enterprise.

Enforcing Features โ€‹

  • Enable Secret Scanning for all new organizations
  • Enable Push Protection by default across all organizations
  • Set Custom Patterns at the enterprise level, making them available to all orgs and repos automatically
  • Standardize security manager access so the right teams can view and triage alerts centrally
  • Decide whether secret scanning validity checks should be enabled so GitHub can verify supported tokens with providers

Enterprise-Level Validity Checking โ€‹

  • Validity checking for supported secret types can be managed as an enterprise-level policy decision
  • This determines whether GitHub should contact the relevant partner provider to verify whether a token is still active
  • It improves prioritization because teams can focus first on secrets that are still valid

Partner Patterns and Provider Notification โ€‹

  • For some partner patterns in public repositories, GitHub can automatically notify the relevant provider when a matching secret is exposed
  • Common examples include providers such as AWS, Microsoft, and Slack
  • For private repositories, validity checking or provider verification behavior depends on administrative configuration and supported integrations

Enforcing these at the enterprise level disables the ability for organization owners to turn them off, ensuring compliance.

Enterprise Configuration Model โ€‹

ScopeTypical use
EnterpriseSet default policy, reporting visibility, and shared patterns across organizations
OrganizationRoll out features to selected repositories and delegate security managers
RepositoryFine-tune workflows, required checks, and remediation operations

TIP

For exam scenarios, choose the highest scope that matches the requirement. If the requirement says "across all organizations" or "enterprise-wide visibility," the answer is usually an enterprise-level control.


Security Managers and Delegated Access โ€‹

Enterprise and organization admins do not need to do all alert triage themselves.

  • Security managers can review and manage security findings without needing broad admin rights everywhere
  • This is useful when central AppSec teams need access to alerts across many repositories
  • It supports separation of duties: platform admins configure GHAS, security managers triage, developers remediate
  • Security managers are not a substitute for owners/admins when the task is enabling GHAS or changing organization and enterprise policy
  • Security managers also cannot manage organization-wide enforcement controls such as required workflows

GHAS Role Capability Matrix โ€‹

CapabilitySecurity ManagerOrg OwnerRepo AdminDeveloper
View Alerts (Org/Enterprise)โœ…โœ…โŒโŒ
View Alerts (Repo level)โœ…โœ…โœ…โœ…
Dismiss Alerts (False Positive / Risk Accepted)โœ…โœ…โœ…โŒ*
Reopen Dismissed Alertsโœ…โœ…โœ…โŒ
Create / Edit Security Advisoriesโœ…โœ…โœ…โŒ
Change Alert Severity (Code Scanning)โœ…โœ…โœ…โŒ
Enable / Disable GHAS FeaturesโŒโœ…โœ…โŒ
Manage Required WorkflowsโŒโœ…โŒโŒ

* Developers may participate in remediation, but dismissal and policy-level actions are typically reserved for repository admins, organization owners, or security managers.

IP Allow Lists and External Integrations โ€‹

If the enterprise uses an IP allow list, GitHub-integrated automation must still be able to reach GitHub from approved addresses.

  • Self-hosted runners may need to be added to the allow list
  • External SAST tooling that uploads SARIF may also need its egress IPs allowed
  • If not, SARIF uploads or workflow steps can fail with 403 errors

Exam Trap

If a GitHub Enterprise scenario mentions IP allow lists and a SARIF upload failing with 403, the likely fix is to allow the runner or external tool's IP.


Enterprise Exam Scenarios โ€‹

ScenarioBest answer direction
Need one dashboard across many orgsEnterprise Security Overview
Need a secret pattern reused everywhereEnterprise-level custom pattern
Need repo maintainers to keep local workflow flexibilitySet policy at org/enterprise, keep remediation in the repo
Need consistent enforcement for PR checksUse rulesets or required checks centrally where possible
Need a mandatory scan workflow everywhereUse enterprise rulesets / required workflows where supported

Numbers and Limits to Remember โ€‹

TopicValue
Pilot rollout size2-5 repositories
Best operational metricMTTR
Enterprise rulesets limit previously noted in these notes75 rulesets

Domain 7 Quick Quiz

1 / 7
โ“

Who can access Security Overview at the organization level?

(Click to reveal)
๐Ÿ’ก
Organization owners and Security managers. Enterprise owners can access enterprise-wide Security Overview across all organizations.

โ† Domain 6 ยท Cheatsheet โ†’

Happy Studying! ๐Ÿš€ โ€ข Privacy-friendly analytics โ€” no cookies, no personal data
Privacy Policy โ€ข AI Disclaimer โ€ข Report an issue