|
1 | 1 | --- |
2 | 2 | title: 'Interpreting secret risk assessment results' |
3 | 3 | shortTitle: 'Interpret results' |
4 | | -intro: 'Use the results from your {% data variables.product.prodname_secret_risk_assessment %} report to improve your organization''s security.' |
| 4 | +intro: 'Understand the results from your {% data variables.product.prodname_secret_risk_assessment %} and prioritize leak remediation.' |
| 5 | +permissions: 'Organization owners, security managers, and users with the **admin** role' |
5 | 6 | allowTitleToDifferFromFilename: true |
6 | | -type: how_to |
7 | 7 | versions: |
8 | 8 | feature: secret-risk-assessment |
9 | 9 | topics: |
10 | | - - Code Security |
11 | | - - Secret scanning |
12 | 10 | - Secret Protection |
13 | 11 | - Organizations |
14 | 12 | - Security |
| 13 | +contentType: tutorials |
15 | 14 | --- |
16 | 15 |
|
17 | | -The {% data variables.product.prodname_secret_risk_assessment %} dashboard displays point-in-time insights into the secrets detected in your organization. {% data reusables.secret-risk-assessment.link-conceptual-information %} |
| 16 | +## Introduction |
| 17 | + |
| 18 | +In this tutorial, you'll interpret your secret risk assessment results, and learn how to: |
| 19 | + |
| 20 | +* Understand risk metrics on the dashboard |
| 21 | +* Identify high-risk secret leaks |
| 22 | +* Prioritize secrets for remediation |
18 | 23 |
|
19 | 24 | ## Prerequisites |
20 | 25 |
|
21 | | -You need to generate a {% data variables.product.prodname_secret_risk_assessment %} report and wait for the scan to complete before being able to view and export the results. See [AUTOTITLE](/code-security/securing-your-organization/understanding-your-organizations-exposure-to-leaked-secrets/viewing-the-secret-risk-assessment-report-for-your-organization#generating-an-initial-secret-risk-assessment) and [Exporting the {% data variables.product.prodname_secret_risk_assessment %} to CSV](/code-security/securing-your-organization/understanding-your-organizations-exposure-to-leaked-secrets/viewing-the-secret-risk-assessment-report-for-your-organization#exporting-the-secret-risk-assessment-to-csv). |
| 26 | +You must generate a {% data variables.product.prodname_secret_risk_assessment %} report and wait for the scan to complete. See [AUTOTITLE](/code-security/securing-your-organization/understanding-your-organizations-exposure-to-leaked-secrets/viewing-the-secret-risk-assessment-report-for-your-organization#generating-an-initial-secret-risk-assessment). |
| 27 | + |
| 28 | +## Step 1: Understand your dashboard metrics |
| 29 | + |
| 30 | +Once your assessment completes, review the key metrics at the top of the dashboard: |
| 31 | + |
| 32 | +* **Total secrets**: Total number of secret leaks found across your organization |
| 33 | +* **Public leaks**: Distinct secrets found in **public** repositories |
| 34 | +* **Preventable leaks**: Leaks that push protection could have prevented |
| 35 | + |
| 36 | +You can also determine the number of secrets found in your **private repositories** by subtracting the number of public leaks from your total secrets. While remediating these secrets is less immediately important, they still pose risk if someone gains unauthorized access to your repositories, or if a repository is made public. |
| 37 | + |
| 38 | +## Step 2: Understand secret categories |
| 39 | + |
| 40 | +Look at the **Secret categories** section to understand **what types of secrets** were leaked. |
| 41 | + |
| 42 | +* **Provider patterns**: Specific secret formats for known services (AWS, Azure, {% data variables.product.github %} tokens) |
| 43 | +* **Generic patterns**: Generic secret formats like private keys, API keys, passwords |
| 44 | + |
| 45 | +Provider patterns are often easier to identify and revoke because you know exactly which service they belong to. Generic patterns may require more investigation. |
| 46 | + |
| 47 | +## Step 3: Identify how many repositories are affected |
| 48 | + |
| 49 | +Check the **Repositories with leaks** metric, which shows how many of your repositories contain secret leaks. |
| 50 | + |
| 51 | +If a **high percentage** of repositories contain leaks, this may indicate: |
| 52 | +* A widespread culture issue around secret management |
| 53 | +* A need for organization-wide training |
| 54 | +* Missing guardrails like push protection, which blocks secrets before they are committed |
| 55 | + |
| 56 | +If only a **few** repositories contain leaks, you can: |
| 57 | +* Focus remediation efforts on specific teams |
| 58 | +* Use the leak information to determine which repositories are high-risk areas |
| 59 | + |
| 60 | +## Step 4: Review leaked secrets by type |
| 61 | + |
| 62 | +Scroll to the bottom to see the detailed **Secret type** table, which includes: |
| 63 | + |
| 64 | +* **Secret type**: The specific kind of secret |
| 65 | +* **Distinct repositories**: How many different repositories contain this type |
| 66 | +* **Secrets found**: Total count of this secret type across all repositories |
| 67 | + |
| 68 | +The table sorts by highest count automatically, helping you identify the greatest risks. |
| 69 | + |
| 70 | +If you see **many secrets of the same type** (for example, multiple AWS keys), this indicates: |
| 71 | +* Developers may not be using environment variables |
| 72 | +* Missing documentation on secret management |
| 73 | + |
| 74 | +## Step 5: Prioritizing remediation and related actions |
22 | 75 |
|
23 | | -## Prioritizing high-risk leaks for remediation |
| 76 | +Now that you understand the metrics, prioritize remediation based on risk. |
24 | 77 |
|
25 | | -To understand your secrets' footprint and exposure to secrets leaks, review the **Total secrets**,**Public leaks** and **Secret locations** metrics. |
| 78 | +The highest priority secrets are **leaked provider patterns in public repositories**, because they are: |
26 | 79 |
|
27 | | -Next, identify the areas in your organization where leaked secrets pose the highest threat to security. |
| 80 | +* Accessible to anyone on the internet |
| 81 | +* Often easier to identify and revoke, since you know which service they belong to |
28 | 82 |
|
29 | | -* **Leaked secrets that are still active** usually present the greatest risk to security. Prioritize any active secrets for remediation ahead of inactive secrets. For more information about checking the validity of a detected credential, see [AUTOTITLE](/enterprise-cloud@latest/code-security/secret-scanning/enabling-secret-scanning-features/enabling-validity-checks-for-your-repository) in the {% data variables.product.prodname_ghe_cloud %} documentation. |
30 | | -* Similarly, **secrets leaked in public repositories** are usually considered a higher risk and priority, than those secrets leaked in private {% ifversion ghec or ghes %}or internal {% endif %}repositories. |
31 | | -* The **Repositories with leaks** metric can indicate how frequent, or the extent of, secret leaks across your organization. A large proportion of repositories with secret leaks may suggest that developer education and increased security awareness around secrets is important for your organization. |
| 83 | +Next, you can address secrets that present lower risk or require more extensive efforts to remediate. These can be: |
32 | 84 |
|
33 | | -## Identifying areas of exposure |
| 85 | +* **Generic patterns in public repositories**, which may require investigation to identify the service or system they belong to |
| 86 | +* **Private repository leaks**, that represent a lower immediate risk but should still be addressed |
34 | 87 |
|
35 | | -Review the **Preventable leaks** and **Secret categories** metrics to understand your current secret detection coverage, in addition to learning how {% data variables.product.github %} can help prevent future secret leaks. |
| 88 | +Finally, look for the following indicators, which may require additional prevention efforts beyond leak remediation: |
36 | 89 |
|
37 | | -* Secret leaks that could have been prevented using {% data variables.product.prodname_GH_secret_protection %} features such as {% data variables.product.prodname_secret_scanning %} and push protection are shown by the **Preventable leaks** metric. |
38 | | -* Using the **Secret categories** metric and the **Token type** table, search for patterns in the type of secrets leaked across your organization. |
39 | | - * Common areas and repeated occurrences of leaked secrets may suggest particular CI/CD workflows or development processes in your organization that are contributing to the results. |
40 | | - * You may also be able to identify specific teams, repositories, or networks that are more prone to secret leaks, and therefore require additional security measures or management to be put in place. |
| 90 | +* **Many repositories with leaks**: Indicates need for organization-wide training and improved security awareness |
| 91 | +* **Repeated secret types**: Suggests specific workflows or teams need targeted intervention |
| 92 | +* **Common secret categories**: May point to particular CI/CD processes requiring security improvements |
41 | 93 |
|
42 | | -## Adopt {% data variables.product.prodname_GH_secret_protection %} to prevent leaks |
| 94 | +## Next steps |
43 | 95 |
|
44 | | -We recommend purchasing {% data variables.product.prodname_GH_secret_protection %} products to improve your organization's exposure to secret leaks and optimize your secret detection rates. {% data variables.product.prodname_GH_secret_protection %} is a continuous monitoring and detection solution that is the most effective path for secure development. See [AUTOTITLE](/code-security/securing-your-organization/understanding-your-organizations-exposure-to-leaked-secrets/choosing-github-secret-protection). |
| 96 | +{% data variables.product.prodname_GH_secret_protection %} provides continuous monitoring and push protection to help remediate any remaining secrets and prevent future leaks. To help you evaluate whether {% data variables.product.prodname_GH_secret_protection %} is right for your organization, you can estimate the cost before enabling it. See [AUTOTITLE](/code-security/securing-your-organization/understanding-your-organizations-exposure-to-leaked-secrets/estimating-the-price-of-secret-protection). |
0 commit comments