Skip to content

Commit d7ea211

Browse files
sophiethekingCopilotisaacmbrown
authored
[EDI] About exposure to vulnerabilities in your code and in dependencies (#59795)
Co-authored-by: Copilot Autofix powered by AI <175728472+Copilot@users.noreply.github.com> Co-authored-by: Isaac Brown <101839405+isaacmbrown@users.noreply.github.com>
1 parent 539b852 commit d7ea211

File tree

1 file changed

+13
-11
lines changed

1 file changed

+13
-11
lines changed

content/code-security/concepts/vulnerability-reporting-and-management/about-your-exposure-to-vulnerabilities-in-your-code-and-in-dependencies.md

Lines changed: 13 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: About exposure to vulnerabilities in your code and in dependencies
33
shortTitle: Vulnerability exposure
4-
intro: Understanding your organization’s exposure to vulnerabilities in first-party code and in all dependencies is essential for enabling you to efficiently assess, prioritize, and remediate vulnerabilities, reducing the likelihood of security breaches.
4+
intro: Understand how vulnerabilities in your own code and in third-party dependencies contribute to your organization’s overall security exposure, and how to measure and reduce that risk.
55
allowTitleToDifferFromFilename: true
66
product: '{% data reusables.gated-features.ghas-billing %}'
77
versions:
@@ -17,9 +17,9 @@ redirect_from:
1717
- /code-security/securing-your-organization/understanding-your-organizations-exposure-to-vulnerabilities/about-your-exposure-to-vulnerable-dependencies
1818
---
1919

20-
## About exposure to vulnerable code
20+
## Risks of unaddressed vulnerabilities
2121

22-
Your organization has exposure to vulnerabilities in both the code you write and maintain, and in the open-source or third-party dependencies your code uses. Assessing your exposure to vulnerable dependencies is crucial if you want to prevent:
22+
Your organization has exposure to vulnerabilities in both the code you write and maintain, and in the open source or third-party dependencies your code uses. Assessing your exposure to vulnerabilities is crucial if you want to prevent:
2323

2424
* **Unplanned downtime and operational disruption**. Exploitation of vulnerabilities can result in application outages, degraded service quality, or cascading failures in critical systems, disrupting your business operations.
2525

@@ -31,7 +31,7 @@ Your organization has exposure to vulnerabilities in both the code you write and
3131

3232
* **Regulatory and licensing issues**. Many regulations and industry standards require organizations to proactively address known vulnerabilities in their software supply chain. Failing to remediate vulnerable dependencies can result in non-compliance, audits, legal penalties, or breaches of open source license obligations.
3333

34-
Regularly assessing your exposure to vulnerabilities is good practice to help identify risks early, implement effective remediation strategies, and maintain resilient, trustworthy software.
34+
Regularly assessing vulnerability exposure helps you identify risks early and prioritize remediation.
3535

3636
## Ways to monitor your repositories for vulnerable code
3737

@@ -41,17 +41,19 @@ Regularly assessing your exposure to vulnerabilities is good practice to help id
4141

4242
{% data variables.product.github %} provides a comprehensive set of {% data variables.product.prodname_dependabot %} metrics to help you monitor, prioritize, and remediate these risks across all repositories in your organization. See [AUTOTITLE](/code-security/concepts/supply-chain-security/about-metrics-for-dependabot-alerts).
4343

44-
## Key tasks for AppSec managers
44+
## Reducing organizational vulnerability exposure
4545

46-
### 1. Monitor vulnerability metrics for dependencies
46+
Reducing organizational vulnerability exposure requires ongoing visibility into risk, remediation progress, and policy enforcement across repositories. {% data variables.product.prodname_dependabot %} and {% data variables.product.prodname_code_scanning %} metrics provide this visibility. Use the following best practices to monitor and reduce your organization's vulnerability exposure:
47+
48+
### Monitor vulnerability metrics for dependencies
4749

4850
Use the metrics overview for {% data variables.product.prodname_dependabot %} to gain visibility into the current state of your organization's dependency vulnerabilities. See [AUTOTITLE](/code-security/security-overview/viewing-metrics-for-dependabot-alerts).
4951

5052
* **Alert prioritization:** Review the number of open {% data variables.product.prodname_dependabot_alerts %} and use filters such as CVSS severity, EPSS exploit likelihood, patch availability, and whether a vulnerable dependency is actually used in deployed artifacts. {% data reusables.security-overview.dependabot-filters-link %}
5153
* **Repository-level breakdown:** Identify which repositories have the highest number of critical or exploitable vulnerabilities.
5254
* **Remediation tracking:** Track the number and percentage of alerts fixed over time to measure the effectiveness of your vulnerability management program.
5355

54-
### 2. Monitor introduction of new {% data variables.product.prodname_code_scanning %} alerts
56+
### Monitor introduction of new {% data variables.product.prodname_code_scanning %} alerts
5557

5658
Use the alert view for {% data variables.product.prodname_code_scanning %} to gain visibility into remediation activity in your organization's pull requests. See [AUTOTITLE](/code-security/security-overview/viewing-metrics-for-pull-request-alerts).
5759

@@ -60,7 +62,7 @@ Use the alert view for {% data variables.product.prodname_code_scanning %} to ga
6062
* **Repository-level breakdown:** Identify which repositories have the highest number of alerts detected in pull requests but still merged into the default branch.
6163
* **Remediation tracking:** Track the number and percentage of alerts fixed over time to measure the effectiveness of your vulnerability management program.
6264

63-
### 3. Prioritize remediation efforts
65+
### Prioritize remediation efforts
6466

6567
Focus on vulnerabilities that present the highest risk to your organization.
6668

@@ -69,20 +71,20 @@ Focus on vulnerabilities that present the highest risk to your organization.
6971
* Encourage development teams to address vulnerabilities that are actually used in deployed artifacts through repository custom properties and using production context. See [AUTOTITLE](/code-security/securing-your-organization/understanding-your-organizations-exposure-to-vulnerabilities/alerts-in-production-code).{% endif %}{% ifversion security-campaigns %}
7072
* Create security campaigns to encourage and track the remediation of high priority {% data variables.product.prodname_code_scanning %} alerts. See [AUTOTITLE](/code-security/securing-your-organization/fixing-security-alerts-at-scale/creating-managing-security-campaigns).{% endif %}
7173

72-
### 4. Communicate risk and progress
74+
### Communicate risk and progress
7375

7476
* Use the metrics pages to communicate key risk factors and remediation progress to stakeholders.
7577
* Provide regular updates on trends, such as the reduction in open critical vulnerabilities or improvements in remediation rates.
7678
* Highlight repositories or teams that require additional support or attention.
7779

78-
### 5. Establish and enforce policies
80+
### Establish and enforce policies
7981

8082
* Set an organization-wide security configuration that enables {% data variables.product.prodname_dependabot %} and {% data variables.product.prodname_code_scanning %} on all existing and new repositories. See [AUTOTITLE](/code-security/securing-your-organization/introduction-to-securing-your-organization-at-scale/about-enabling-security-features-at-scale).
8183
* Enable dependency review to comment on pull requests in all repositories.
8284
* Create an organization-wide ruleset to protect the default branch and require critical {% data variables.product.prodname_code_scanning %} alerts to be fixed before a pull request can be merged. See [AUTOTITLE](/organizations/managing-organization-settings/managing-rulesets-for-repositories-in-your-organization).
8385
* Work with repository administrators to enable automated security updates where possible. See [AUTOTITLE](/code-security/dependabot/dependabot-security-updates/about-dependabot-security-updates).
8486

85-
### 6. Assess the impact of alerts
87+
### Assess the impact of alerts
8688

8789
* Regularly review how {% data variables.product.prodname_dependabot %} and {% data variables.product.prodname_code_scanning %} alerts are helping to block security vulnerabilities from entering your codebase.
8890
* Use historical data to demonstrate the value of proactive dependency management.

0 commit comments

Comments
 (0)