GitHub Enterprise Cloud attack surface analysis

GitHub Enterprise Cloud attack surface analysis

Pretty simple list that maps every potential abuse point or hardening opportunity in GitHub Enterprise Cloud, complete with direct links to GitHub’s documentation.


Account and profile management

Enterprise management

Organization management

Authentication

Authorization

  • OAuth App approvals
  • OIDC IdP Conditional Access Policy to dynamically allow or deny interactions (including from GitHub App, through SSH, using PATs)

Repositories management

Webhooks

Branch Protection 

  • Branch Protection (only listing aspects that have security implications)
  • Require a pull request before merging
  • Require a certain number of approvals
  • Dismiss stale pull request approvals when new commits are pushed
  • Require review from Code Owners
  • Restrict who can dismiss pull request reviews
  • Allow specified actors to bypass required pull requests
  • Require approval of the most recent push
  • Require status checks to pass before merging
  • Require signed commits
  • Require deployments to succeed before merging
  • Lock branch (setting the branch read-only)
  • Do not allow administrators to bypass branch protection
  • Restrict who can push to matching branches
  • Allow all users with push access to force push on the protected branch
  • Allow all users with push access to delete to protected branch

Tag Protection

Code Owners (ex. ./github/CODEOWNERS, ./gitlab/CODEOWNERS, etc. )

  • Adds extra layer of security to define who should review changes to files and directories in the repository. This can be enforced through Branch Protection.

Audit logging


To view or add a comment, sign in

More articles by Artem Fedorov

Others also viewed

Explore content categories