Skip to content

Latest commit

 

History

History
55 lines (40 loc) · 6.3 KB

README.md

File metadata and controls

55 lines (40 loc) · 6.3 KB

Starter Kits

This page contains starter kit information, which represent templates, code and configuration to help you get started quickly with continuous testing best practices described in this overall guide. Please see categories and links below for details.

Software Composition Analysis

This section contains links to sample actions, templates and configurations that analyze and validate composition of Open Source Software (OSS) components in software systems. Identifying software and licensing vulnerabilites and ensuring routine software updates is an OSS cybersecurity best practice.

Dependabot

A GitHub ecosystem tool for dependency version and security vulnerability analysis.

Automated Dependency Updates

This Dependabot task provides an automated check for OSS component updates and automatically creates pull requests to commit new versions.

Starter Kit:

To leverage Dependabot, make sure to do the following:

  1. Discuss with your development team the cybersecurity best practice to regularly update OSS to latest versions and seek consensus on a workflow to accept proposed updates.
  2. Add Dependabot automation to your repository, either via the admin console or manually (choose one):

Shortcut
Copy the pre-set configuration to an identical path in your repository, e.g. .github/dependabot.yml.

  1. Modify Dependabot configurations for your project:

Requirement
Set properties to match your repository setup, including core packaging system.

  1. Dependabot is now installed and detections can be tracked through the dependency graph at Insights -> Dependency graph -> Dependabot. Pull Requests also will include automatically created Dependabot merges.

Automated Security Updates

This Dependabot task automates security scanning for known vulnerabilities in OSS components and automatically creates pull requests to update flagged components.

Dependabot Security Updates requires Dependabot Automated Dependency Updates (see above). Although technically part of the same automation stack, it's enabled through the GitHub Settings UI. Optionally, dependency updates can be disabled so that only security updates create pull requests.

Requirement
Install and set up the Starter Kit for Dependabot Automated Dependency Updates.

To leverage this template, make sure to do the following:

  1. Discuss with your development team the cybersecurity best practice to regularly scan OSS components for security flaws and seek consensus on a workflow to accept proposed updates.
  2. Enable Security Updates:
    1. At Settings -> Code security and analysis -> Dependabot, select the Enable button to turn on Dependabot security updates.

Requirement
Admin rights are necessary to modify Code security and analysis settings.

  1. Modify Dependabot configurations for your project: (optional)
    1. If only security-related pull requests are desired, set the open-pull-requests-limit property to 0 for updates block(s).