Skip to content

Commit d4980bd

Browse files
mchammer01Copilotsabrowning1
authored
[EDI] Create a new "Secure your secrets" map topic within "How-tos" (#59064)
Co-authored-by: Copilot Autofix powered by AI <175728472+Copilot@users.noreply.github.com> Co-authored-by: Sam Browning <106113886+sabrowning1@users.noreply.github.com>
1 parent 7206b3a commit d4980bd

File tree

36 files changed

+188
-152
lines changed

36 files changed

+188
-152
lines changed

content/code-security/concepts/secret-security/about-delegated-bypass-for-push-protection.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -15,6 +15,7 @@ topics:
1515
shortTitle: Delegated bypass
1616
redirect_from:
1717
- /code-security/secret-scanning/using-advanced-secret-scanning-and-push-protection-features/delegated-bypass-for-push-protection/about-delegated-bypass-for-push-protection
18+
- /code-security/secret-scanning/using-advanced-secret-scanning-and-push-protection-features/delegated-bypass-for-push-protection
1819
contentType: concepts
1920
---
2021

content/code-security/concepts/secret-security/about-secret-scanning.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -126,7 +126,6 @@ Define your own patterns for secrets used by your organization that {% data vari
126126

127127
* [AUTOTITLE](/code-security/secret-scanning/enabling-secret-scanning-features/enabling-secret-scanning-for-your-repository)
128128
* [AUTOTITLE](/code-security/secret-scanning/introduction/about-push-protection)
129-
* [AUTOTITLE](/code-security/secret-scanning/working-with-secret-scanning-and-push-protection)
130129
* [AUTOTITLE](/code-security/getting-started/best-practices-for-preventing-data-leaks-in-your-organization)
131130
* [AUTOTITLE](/code-security/getting-started/securing-your-repository)
132131
* [AUTOTITLE](/authentication/keeping-your-account-and-data-secure)

content/code-security/how-tos/index.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,8 +17,9 @@ topics:
1717
contentType: how-tos
1818
children:
1919
- /secure-at-scale
20-
- /secure-your-supply-chain
20+
- /secure-your-secrets
2121
- /scan-code-for-vulnerabilities
22+
- /secure-your-supply-chain
2223
- /maintain-quality-code
2324
- /report-and-fix-vulnerabilities
2425
---

content/code-security/secret-scanning/using-advanced-secret-scanning-and-push-protection-features/custom-patterns/defining-custom-patterns-for-secret-scanning.md renamed to content/code-security/how-tos/secure-your-secrets/customize-leak-detection/defining-custom-patterns-for-secret-scanning.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,17 +1,18 @@
11
---
22
title: Defining custom patterns for secret scanning
33
shortTitle: Define custom patterns
4-
intro: 'You can define your own custom patterns to extend the capabilities of {% data variables.product.prodname_secret_scanning %} by generating one or more regular expressions.'
4+
intro: You can define your own custom patterns to extend the capabilities of {% data variables.product.prodname_secret_scanning %} by generating one or more regular expressions.
55
product: '{% data reusables.gated-features.secret-scanning-custom-patterns %}'
66
permissions: '{% data reusables.permissions.security-enterprise-enable %}'
77
redirect_from:
88
- /code-security/secret-security/defining-custom-patterns-for-secret-scanning
99
- /code-security/secret-scanning/defining-custom-patterns-for-secret-scanning
10+
- /code-security/secret-scanning/using-advanced-secret-scanning-and-push-protection-features/custom-patterns/defining-custom-patterns-for-secret-scanning
1011
versions:
1112
fpt: '*'
1213
ghes: '*'
1314
ghec: '*'
14-
type: how_to
15+
contentType: how-tos
1516
topics:
1617
- Secret Protection
1718
- Secret scanning

content/code-security/secret-scanning/enabling-secret-scanning-features/enabling-extended-metadata-checks-for-your-repository.md renamed to content/code-security/how-tos/secure-your-secrets/customize-leak-detection/enabling-extended-metadata-checks-for-your-repository.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,17 +1,18 @@
11
---
22
title: Enabling extended metadata checks for your repository
33
shortTitle: Enable metadata checks
4-
intro: 'Learn how to enable extended metadata checks for detected secrets so alerts detected by {% data variables.product.prodname_secret_scanning %} include additional information that help you assess and remediate leaks faster.'
4+
intro: Learn how to enable extended metadata checks for detected secrets so alerts detected by {% data variables.product.prodname_secret_scanning %} include additional information that help you assess and remediate leaks faster.
55
product: '{% data reusables.gated-features.metadata-checks-ghas %}'
66
permissions: '{% data reusables.permissions.push-protection %}'
77
versions:
88
feature: secret-scanning-extended-metadata-checks
9-
type: how_to
9+
contentType: how-tos
1010
topics:
1111
- Secret scanning
1212
- Secret Protection
1313
- Alerts
14-
contentType: how-tos
14+
redirect_from:
15+
- /code-security/secret-scanning/enabling-secret-scanning-features/enabling-extended-metadata-checks-for-your-repository
1516
---
1617

1718
{% data reusables.secret-scanning.metadata-checks-public-preview %}

content/code-security/secret-scanning/enabling-secret-scanning-features/enabling-validity-checks-for-your-repository.md renamed to content/code-security/how-tos/secure-your-secrets/customize-leak-detection/enabling-validity-checks-for-your-repository.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,15 +1,17 @@
11
---
22
title: Enabling validity checks for your repository
33
shortTitle: Enable validity checks
4-
intro: 'Enabling validity checks on your repository helps you prioritize the remediation of alerts as it tells you if a secret is active or inactive.'
4+
intro: Enabling validity checks on your repository helps you prioritize the remediation of alerts as it tells you if a secret is active or inactive.
55
product: '{% data reusables.gated-features.partner-pattern-validity-check-ghas %}'
66
versions:
77
feature: secret-scanning-validity-check-partner-patterns
8-
type: how_to
8+
contentType: how-tos
99
topics:
1010
- Secret scanning
1111
- Secret Protection
1212
- Alerts
13+
redirect_from:
14+
- /code-security/secret-scanning/enabling-secret-scanning-features/enabling-validity-checks-for-your-repository
1315
---
1416

1517
## About validity checks

content/code-security/secret-scanning/using-advanced-secret-scanning-and-push-protection-features/excluding-folders-and-files-from-secret-scanning.md renamed to content/code-security/how-tos/secure-your-secrets/customize-leak-detection/excluding-folders-and-files-from-secret-scanning.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,17 +1,19 @@
11
---
22
title: Excluding folders and files from secret scanning
3-
intro: 'You can customize {% data variables.product.prodname_secret_scanning %} to automatically close alerts for secrets found in specific directories or files by configuring a `secret_scanning.yml` file in your repository.'
3+
intro: You can customize {% data variables.product.prodname_secret_scanning %} to automatically close alerts for secrets found in specific directories or files by configuring a `secret_scanning.yml` file in your repository.
44
permissions: '{% data reusables.permissions.secret-scanning-alerts %}'
55
shortTitle: Exclude folders and files
66
versions:
77
fpt: '*'
88
ghes: '*'
99
ghec: '*'
10-
type: how_to
10+
contentType: how-tos
1111
topics:
1212
- Secret scanning
1313
- Secret Protection
1414
- Repositories
15+
redirect_from:
16+
- /code-security/secret-scanning/using-advanced-secret-scanning-and-push-protection-features/excluding-folders-and-files-from-secret-scanning
1517
---
1618

1719
## About {% data variables.product.prodname_secret_scanning %}

content/code-security/secret-scanning/copilot-secret-scanning/generating-regular-expressions-for-custom-patterns-with-copilot-secret-scanning.md renamed to content/code-security/how-tos/secure-your-secrets/customize-leak-detection/generating-regular-expressions-for-custom-patterns-with-copilot-secret-scanning.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
---
22
title: Generating regular expressions for custom patterns with Copilot secret scanning
33
shortTitle: Regular expression generator
4-
intro: 'You can use {% data variables.secret-scanning.copilot-secret-scanning %}''s {% data variables.secret-scanning.custom-pattern-regular-expression-generator %} to write regular expressions for custom patterns. The generator uses an AI model to generate expressions that match your input, and optionally example strings.'
4+
intro: You can use {% data variables.secret-scanning.copilot-secret-scanning %}'s {% data variables.secret-scanning.custom-pattern-regular-expression-generator %} to write regular expressions for custom patterns. The generator uses an AI model to generate expressions that match your input, and optionally example strings.
55
permissions: '{% data reusables.permissions.security-repo-enable %}'
66
allowTitleToDifferFromFilename: true
77
versions:
88
feature: secret-scanning-custom-pattern-ai-generated
9-
type: how_to
9+
contentType: how-tos
1010
topics:
1111
- Secret Protection
1212
- Secret scanning
@@ -16,6 +16,7 @@ redirect_from:
1616
- /code-security/secret-scanning/generating-regular-expressions-for-custom-patterns-with-ai
1717
- /code-security/secret-scanning/using-advanced-secret-scanning-and-push-protection-features/custom-patterns/generating-regular-expressions-for-custom-patterns-with-ai
1818
- /code-security/secret-scanning/copilot-secret-scanning/generating-regular-expressions-for-custom-patterns-with-ai
19+
- /code-security/secret-scanning/copilot-secret-scanning/generating-regular-expressions-for-custom-patterns-with-copilot-secret-scanning
1920
---
2021

2122
## Generating a regular expression for a repository with {% data variables.secret-scanning.copilot-secret-scanning %}
Lines changed: 20 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,20 @@
1+
---
2+
title: How-tos for customizing secret leak detection
3+
shortTitle: Detection customization
4+
intro: Learn how to customize {% data variables.product.github %}'s secret leak detection tools.
5+
versions:
6+
fpt: '*'
7+
ghes: '*'
8+
ghec: '*'
9+
topics:
10+
- Secret Protection
11+
- Secret scanning
12+
contentType: how-tos
13+
children:
14+
- /defining-custom-patterns-for-secret-scanning
15+
- /generating-regular-expressions-for-custom-patterns-with-copilot-secret-scanning
16+
- /managing-custom-patterns
17+
- /excluding-folders-and-files-from-secret-scanning
18+
- /enabling-validity-checks-for-your-repository
19+
- /enabling-extended-metadata-checks-for-your-repository
20+
---

content/code-security/secret-scanning/using-advanced-secret-scanning-and-push-protection-features/custom-patterns/managing-custom-patterns.md renamed to content/code-security/how-tos/secure-your-secrets/customize-leak-detection/managing-custom-patterns.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,16 +1,18 @@
11
---
22
title: Managing custom patterns
33
shortTitle: Manage custom patterns
4-
intro: 'You can view, edit, and remove custom patterns, as well as enable push protection for custom patterns.'
4+
intro: You can view, edit, and remove custom patterns, as well as enable push protection for custom patterns.
55
permissions: '{% data reusables.permissions.security-enterprise-enable %}'
66
versions:
77
fpt: '*'
88
ghes: '*'
99
ghec: '*'
10-
type: how_to
10+
contentType: how-tos
1111
topics:
1212
- Secret Protection
1313
- Secret scanning
14+
redirect_from:
15+
- /code-security/secret-scanning/using-advanced-secret-scanning-and-push-protection-features/custom-patterns/managing-custom-patterns
1416
---
1517

1618
Custom patterns are user-defined patterns that you can use to identify secrets that are not detected by the default patterns supported by {% data variables.product.prodname_secret_scanning %}. For more information, see [AUTOTITLE](/code-security/secret-scanning/using-advanced-secret-scanning-and-push-protection-features/custom-patterns/defining-custom-patterns-for-secret-scanning).

0 commit comments

Comments
 (0)