Skip to content

Commit fca7373

Browse files
mchammer01lecoursensabrowning1
authored
Convert "Interpreting secret risk assessment results" into a tutorial (#58120)
Co-authored-by: Laura Coursen <[email protected]> Co-authored-by: Sam Browning <[email protected]>
1 parent d521734 commit fca7373

File tree

1 file changed

+72
-20
lines changed

1 file changed

+72
-20
lines changed
Lines changed: 72 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -1,44 +1,96 @@
11
---
22
title: 'Interpreting secret risk assessment results'
33
shortTitle: 'Interpret results'
4-
intro: 'Use the results from your {% data variables.product.prodname_secret_risk_assessment %} report to improve your organization''s security.'
4+
intro: 'Understand the results from your {% data variables.product.prodname_secret_risk_assessment %} and prioritize leak remediation.'
5+
permissions: 'Organization owners, security managers, and users with the **admin** role'
56
allowTitleToDifferFromFilename: true
6-
type: how_to
77
versions:
88
feature: secret-risk-assessment
99
topics:
10-
- Code Security
11-
- Secret scanning
1210
- Secret Protection
1311
- Organizations
1412
- Security
13+
contentType: tutorials
1514
---
1615

17-
The {% data variables.product.prodname_secret_risk_assessment %} dashboard displays point-in-time insights into the secrets detected in your organization. {% data reusables.secret-risk-assessment.link-conceptual-information %}
16+
## Introduction
17+
18+
In this tutorial, you'll interpret your secret risk assessment results, and learn how to:
19+
20+
* Understand risk metrics on the dashboard
21+
* Identify high-risk secret leaks
22+
* Prioritize secrets for remediation
1823

1924
## Prerequisites
2025

21-
You need to generate a {% data variables.product.prodname_secret_risk_assessment %} report and wait for the scan to complete before being able to view and export the results. See [AUTOTITLE](/code-security/securing-your-organization/understanding-your-organizations-exposure-to-leaked-secrets/viewing-the-secret-risk-assessment-report-for-your-organization#generating-an-initial-secret-risk-assessment) and [Exporting the {% data variables.product.prodname_secret_risk_assessment %} to CSV](/code-security/securing-your-organization/understanding-your-organizations-exposure-to-leaked-secrets/viewing-the-secret-risk-assessment-report-for-your-organization#exporting-the-secret-risk-assessment-to-csv).
26+
You must generate a {% data variables.product.prodname_secret_risk_assessment %} report and wait for the scan to complete. See [AUTOTITLE](/code-security/securing-your-organization/understanding-your-organizations-exposure-to-leaked-secrets/viewing-the-secret-risk-assessment-report-for-your-organization#generating-an-initial-secret-risk-assessment).
27+
28+
## Step 1: Understand your dashboard metrics
29+
30+
Once your assessment completes, review the key metrics at the top of the dashboard:
31+
32+
* **Total secrets**: Total number of secret leaks found across your organization
33+
* **Public leaks**: Distinct secrets found in **public** repositories
34+
* **Preventable leaks**: Leaks that push protection could have prevented
35+
36+
You can also determine the number of secrets found in your **private repositories** by subtracting the number of public leaks from your total secrets. While remediating these secrets is less immediately important, they still pose risk if someone gains unauthorized access to your repositories, or if a repository is made public.
37+
38+
## Step 2: Understand secret categories
39+
40+
Look at the **Secret categories** section to understand **what types of secrets** were leaked.
41+
42+
* **Provider patterns**: Specific secret formats for known services (AWS, Azure, {% data variables.product.github %} tokens)
43+
* **Generic patterns**: Generic secret formats like private keys, API keys, passwords
44+
45+
Provider patterns are often easier to identify and revoke because you know exactly which service they belong to. Generic patterns may require more investigation.
46+
47+
## Step 3: Identify how many repositories are affected
48+
49+
Check the **Repositories with leaks** metric, which shows how many of your repositories contain secret leaks.
50+
51+
If a **high percentage** of repositories contain leaks, this may indicate:
52+
* A widespread culture issue around secret management
53+
* A need for organization-wide training
54+
* Missing guardrails like push protection, which blocks secrets before they are committed
55+
56+
If only a **few** repositories contain leaks, you can:
57+
* Focus remediation efforts on specific teams
58+
* Use the leak information to determine which repositories are high-risk areas
59+
60+
## Step 4: Review leaked secrets by type
61+
62+
Scroll to the bottom to see the detailed **Secret type** table, which includes:
63+
64+
* **Secret type**: The specific kind of secret
65+
* **Distinct repositories**: How many different repositories contain this type
66+
* **Secrets found**: Total count of this secret type across all repositories
67+
68+
The table sorts by highest count automatically, helping you identify the greatest risks.
69+
70+
If you see **many secrets of the same type** (for example, multiple AWS keys), this indicates:
71+
* Developers may not be using environment variables
72+
* Missing documentation on secret management
73+
74+
## Step 5: Prioritizing remediation and related actions
2275

23-
## Prioritizing high-risk leaks for remediation
76+
Now that you understand the metrics, prioritize remediation based on risk.
2477

25-
To understand your secrets' footprint and exposure to secrets leaks, review the **Total secrets**,**Public leaks** and **Secret locations** metrics.
78+
The highest priority secrets are **leaked provider patterns in public repositories**, because they are:
2679

27-
Next, identify the areas in your organization where leaked secrets pose the highest threat to security.
80+
* Accessible to anyone on the internet
81+
* Often easier to identify and revoke, since you know which service they belong to
2882

29-
* **Leaked secrets that are still active** usually present the greatest risk to security. Prioritize any active secrets for remediation ahead of inactive secrets. For more information about checking the validity of a detected credential, see [AUTOTITLE](/enterprise-cloud@latest/code-security/secret-scanning/enabling-secret-scanning-features/enabling-validity-checks-for-your-repository) in the {% data variables.product.prodname_ghe_cloud %} documentation.
30-
* Similarly, **secrets leaked in public repositories** are usually considered a higher risk and priority, than those secrets leaked in private {% ifversion ghec or ghes %}or internal {% endif %}repositories.
31-
* The **Repositories with leaks** metric can indicate how frequent, or the extent of, secret leaks across your organization. A large proportion of repositories with secret leaks may suggest that developer education and increased security awareness around secrets is important for your organization.
83+
Next, you can address secrets that present lower risk or require more extensive efforts to remediate. These can be:
3284

33-
## Identifying areas of exposure
85+
* **Generic patterns in public repositories**, which may require investigation to identify the service or system they belong to
86+
* **Private repository leaks**, that represent a lower immediate risk but should still be addressed
3487

35-
Review the **Preventable leaks** and **Secret categories** metrics to understand your current secret detection coverage, in addition to learning how {% data variables.product.github %} can help prevent future secret leaks.
88+
Finally, look for the following indicators, which may require additional prevention efforts beyond leak remediation:
3689

37-
* Secret leaks that could have been prevented using {% data variables.product.prodname_GH_secret_protection %} features such as {% data variables.product.prodname_secret_scanning %} and push protection are shown by the **Preventable leaks** metric.
38-
* Using the **Secret categories** metric and the **Token type** table, search for patterns in the type of secrets leaked across your organization.
39-
* Common areas and repeated occurrences of leaked secrets may suggest particular CI/CD workflows or development processes in your organization that are contributing to the results.
40-
* You may also be able to identify specific teams, repositories, or networks that are more prone to secret leaks, and therefore require additional security measures or management to be put in place.
90+
* **Many repositories with leaks**: Indicates need for organization-wide training and improved security awareness
91+
* **Repeated secret types**: Suggests specific workflows or teams need targeted intervention
92+
* **Common secret categories**: May point to particular CI/CD processes requiring security improvements
4193

42-
## Adopt {% data variables.product.prodname_GH_secret_protection %} to prevent leaks
94+
## Next steps
4395

44-
We recommend purchasing {% data variables.product.prodname_GH_secret_protection %} products to improve your organization's exposure to secret leaks and optimize your secret detection rates. {% data variables.product.prodname_GH_secret_protection %} is a continuous monitoring and detection solution that is the most effective path for secure development. See [AUTOTITLE](/code-security/securing-your-organization/understanding-your-organizations-exposure-to-leaked-secrets/choosing-github-secret-protection).
96+
{% data variables.product.prodname_GH_secret_protection %} provides continuous monitoring and push protection to help remediate any remaining secrets and prevent future leaks. To help you evaluate whether {% data variables.product.prodname_GH_secret_protection %} is right for your organization, you can estimate the cost before enabling it. See [AUTOTITLE](/code-security/securing-your-organization/understanding-your-organizations-exposure-to-leaked-secrets/estimating-the-price-of-secret-protection).

0 commit comments

Comments
 (0)