Configure specific tools
Configure individual code security tools across your organization to assess risk, enable protections, and manage scanning and dependency features at scale.
Running the secret risk assessment for your organization
Determine your organization's exposure to leaked secrets by generating a secret risk assessment report.
Viewing the secret risk assessment report for your organization
Understand your organization's exposure to leaked secrets at a glance by viewing your most recent secret risk assessment report.
Estimating the price of Secret Protection
Learn how to use the pricing calculator to estimate the monthly cost of GitHub Secret Protection for your repositories.
Calculating the cost savings of push protection
Learn how to use the ROI calculator to estimate the remediation time and labor costs you'll avoid by preventing leaked secrets.
Pricing and enabling GitHub Secret Protection
Secure your organization's secrets within your budget by enabling GitHub Secret Protection.
Configuring default setup for code scanning at scale
You can quickly configure code scanning for repositories across your organization using default setup.
Configuring advanced setup for code scanning with CodeQL at scale
You can use a script to configure advanced setup for code scanning for a specific group of repositories in your organization.
Enforcing dependency review across an organization
Dependency review lets you catch insecure dependencies before you introduce them to your environment. You can enforce the use of the dependency review action across your organization.
Configuring private vulnerability reporting for an organization
Organization owners and security managers can allow security researchers to report vulnerabilities securely in repositories within the organization by enabling private vulnerability reporting for all its public repositories.