Skip to content

Commit ae505f9

Browse files
author
build docs workflow
committed
update docs
1 parent 520efcb commit ae505f9

File tree

3 files changed

+34
-6
lines changed

3 files changed

+34
-6
lines changed

docs/github/repository/forking_allowed_for_repository.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,18 +1,18 @@
11
---
22
layout: default
3-
title: Forking Should Not Be Allowed for This Repository
3+
title: Forking Should Not Be Allowed for Private/Internal Repositories
44
parent: Repository Policies
55
grand_parent: GitHub Policies
66
---
77

88

9-
## Forking Should Not Be Allowed for This Repository
9+
## Forking Should Not Be Allowed for Private/Internal Repositories
1010
policy name: forking_allowed_for_repository
1111

1212
severity: LOW
1313

1414
### Description
15-
Forking a repository can lead to loss of control and potential exposure of the source code. If you do not need forking, it is recommended to turn it off in the repository configuration. If needed, forking should be turned on by admins deliberately when opting to create a fork.
15+
Forking private or internal repositories can lead to unauthorized spread and potential exposure of sensitive source code. It is recommended to disable forking for private repositories in the repository or the organization configuration to maintain control over the source code. If forking is necessary, it should be enabled selectively by admins for specific collaboration needs on private repositories.
1616

1717
### Threat Example(s)
1818
Forked repositories cause more code and secret sprawl in the organization as forks are independent copies of the repository and need to be tracked separately, making it more difficult to keep track of sensitive assets and contain potential incidents.
Lines changed: 28 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,28 @@
1+
---
2+
layout: default
3+
title: Secret Scanning should be enabled
4+
parent: Repository Policies
5+
grand_parent: GitHub Policies
6+
---
7+
8+
9+
## Secret Scanning should be enabled
10+
policy name: secret_scanning_not_enabled
11+
12+
severity: MEDIUM
13+
14+
### Description
15+
Repository should have secret scanning enabled. Secret scanning helps prevent the exposure of sensitive information and ensures compliance.
16+
17+
### Threat Example(s)
18+
Exposed secrets increases the risk of sensitive information such as API keys, passwords, and tokens being disclosed, leading to unauthorized access to systems and services, and data breaches.
19+
20+
21+
22+
### Remediation
23+
1. Go to the repository settings page
24+
2. Under the 'Security' title on the left, select 'Code security and analysis'
25+
3. Under 'Secret scanning', click 'Enable'
26+
27+
28+

docs/gitlab/project/forking_allowed_for_repository.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,18 +1,18 @@
11
---
22
layout: default
3-
title: Forking Should Not Be Allowed
3+
title: Forking Should Not Be Allowed for Private/Internal Projects
44
parent: Project Policies
55
grand_parent: GitLab Policies
66
---
77

88

9-
## Forking Should Not Be Allowed
9+
## Forking Should Not Be Allowed for Private/Internal Projects
1010
policy name: forking_allowed_for_repository
1111

1212
severity: LOW
1313

1414
### Description
15-
Forking a repository can lead to loss of control and potential exposure of source code. If you do not need forking, it is recommended to turn it off in the project's configuration. The option to fork should be enabled only by owners deliberately when opting to create a fork.
15+
Forking a project (repository) can lead to loss of control and potential exposure of source code. If you do not need forking, it is recommended to turn it off in the project or group configuration. The option to fork should be enabled only by owners deliberately when opting to create a fork.
1616

1717
### Threat Example(s)
1818
Forked repositories may leak important code assets or sensitive secrets embedded in the code to anyone outside your organization, as the code becomes publicly accessible.

0 commit comments

Comments
 (0)