Skip to content

Apply "GitHub Recommended" security configuration to existing and new repos #768

Open
@consideRatio

Description

@consideRatio

I propose that we pilot use of the GitHub recommended security configuration for all existing and new repositories in a "Don't enforce" way, and that we at a later time consider transitioning to "Enforce" based on gained experience. By piloting this security configuration in our GitHub org, we gain experience of relevance for other Jupyter organizations. jupyter/security#102 tracks this on a Jupyter enterprise level including 16 active Jupyter GitHub orgs.

This is how the security configuration looks as seen from JupyterHub org's settings:

image
image

Note that JupyterHub currently have a security configuration applied for four repositories (jupyterhub-container-images, action-get-guayio-tags, pamela, escapism) called "Legacy" which is applied to all new repositories, but I think it is either not doing anything or disabling security features otherwise on by default (see the legacy security config here here).

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions