GitHub Enterprise Cloud customers with an enterprise account may now participate in the audit log streaming public beta. This will allow you to stream audit log and Git events for your enterprise to Splunk or Azure Event Hubs. Please see the GitHub blog for more information.
Secret scanning: user-defined patterns now support editing
GitHub Advanced Security customers can now edit their custom patterns defined at the repository, organization, and enterprise levels. After a user edits and saves a pattern, secret scanning searches for matches both in a repository's entire git history and in any new commits. Editing a pattern will close alerts previously associated with the pattern if they no longer match the updated version.
The new editing feature comes along with other UI and UX updates, with additional improvements like dry-runs in the works.
Now that users can edit their patterns, we're also taking custom patterns out of beta on cloud. Over 50 enterprises have adopted the feature and written over 100 unique patterns since the initial release in June.
User-defined patterns will be generally available on server next quarter in GitHub Enterprise Server 3.3.
Learn more about custom patterns
Learn more about secret scanning
GitHub Secret Scanning scans repositories for known types of secrets, to prevent fraudulent use of secrets that were committed accidentally. This protects users from fraud and data leaks.
Contributed Systems provides open source and commercial background job systems (Sidekiq and Faktory) for business applications written in a variety of programming languages, including Ruby, Go, Python, and JavaScript. If your Contributed Systems credentials are committed to a public repository, we'll send those matches to them and they'll reach out to you directly.
We continue to welcome new partners for public repo secret scanning. In addition, GitHub Advanced Security customers can also scan their private repositories for leaked secrets.