Skip to content

Latest commit

Β 

History

History
190 lines (165 loc) Β· 31.1 KB

File metadata and controls

190 lines (165 loc) Β· 31.1 KB

GitHub Advanced Security (GHAS) Feature Matrix

This document helps answer the question "is this GHAS feature available in my version of GitHub Enterprise Server?".

The following tables include notable feature releases for GitHub Advanced Security. Each row represents a feature. The columns in the row indicate the level of support for each supported Enterprise Server release. Are your repositories hosted on github.com? All of these features are already available for you πŸ‘.

Contents

How do I read this document?

Each section of this document represents a different capability of the GitHub security features. Each row in the tables represent a different feature of GHAS. The columns indicate if that feature is available in each version of GitHub Enterprise Server.

Cells with β˜‘οΈ indicate Public Preview support. βœ… indicates General Availability.

End of life Archive

Release notes

Version 3.14 3.15 3.16 3.17 3.18 3.19 3.20
Release date 2024-08-06 2024-11-12 2025-02-25 2025-05-20 2025-10-14 2025-12-09 2026-03-17
Deprecation date 2025-08-27 2025-12-19 2026-03-11 2026-06-03 2026-10-14 2026-12-09 2027-03-17
Notes Notes Notes Notes Notes Notes Notes

Secret Protection

Secret scanning identifies plain text credentials inside your code repository. Learn more about secret scanning

Feature 3.14 3.15 3.16 3.17 3.18 3.19 3.20
Partner pattern count 274 286 289 321 347 370 452
Non-provider patterns β˜‘οΈ β˜‘οΈ βœ… βœ… βœ… βœ… βœ…
User-space secret scanning βœ… βœ… βœ… βœ… βœ… βœ… βœ…
Push Protection Bypass β˜‘οΈ β˜‘οΈ βœ… βœ… βœ… βœ… βœ…
Detect secrets leaked in discussions and in pull request titles, bodies, and comments β˜‘οΈ βœ… βœ… βœ… βœ… βœ… βœ…
Push protection on file upload β˜‘οΈ β˜‘οΈ βœ… βœ… βœ… βœ… βœ…
Audit log events for non-provider patterns βœ… βœ… βœ… βœ… βœ… βœ… βœ…
Create a push protection bypass API endpoint βœ… βœ… βœ… βœ… βœ… βœ… βœ…
Enabling detection of non-provider patterns for an organization β˜‘οΈ βœ… βœ… βœ… βœ… βœ… βœ…
REST API endpoint for secret scanning scan history βœ… βœ… βœ… βœ… βœ… βœ…
Delegated alert dismissal for secret scanning β˜‘οΈ βœ… βœ… βœ…
Secret scanning scan events via audit log and webhooks βœ… βœ… βœ… βœ…
Base64-encoded GitHub tokens detection βœ… βœ… βœ… βœ…
Push protection bypass requests management via REST API βœ… βœ… βœ… βœ…
Free secret risk assessment for organization and security admins βœ… βœ… βœ…
Configurable push protection patterns βœ… βœ… βœ…
Secret scanning in GitHub wikis βœ… βœ…
REST API first_location_detected and has_more_locations fields βœ… βœ…
Secret scanning validity checks βœ…
Secret scanning alert assignment βœ…
Enterprise-level push protection delegated bypass βœ…

Code Security

Code Scanning

Code scanning is a feature that you use to analyze the code in a GitHub repository to find security vulnerabilities and coding errors. Any problems identified by the analysis are shown in GitHub.

Feature 3.14 3.15 3.16 3.17 3.18 3.19 3.20
CodeQL "toolcache" Version 2.17.6 2.18.4 2.20.3 2.20.7 2.21.4 2.22.4 2.23.9
Kotlin language support β˜‘οΈ βœ… βœ… βœ… βœ… βœ… βœ…
CodeQL supports Swift programming language β˜‘οΈ βœ… βœ… βœ… βœ… βœ… βœ…
CodeQL threat models for detecting relevant alerts β˜‘οΈ β˜‘οΈ β˜‘οΈ βœ… βœ… βœ… βœ…
Code Scanning merge protection rulesets β˜‘οΈ β˜‘οΈ β˜‘οΈ βœ… βœ… βœ… βœ…
CodeQL threat models for default setup β˜‘οΈ β˜‘οΈ β˜‘οΈ βœ… βœ… βœ… βœ…
CodeQL model packs for organization/repo β˜‘οΈ β˜‘οΈ β˜‘οΈ βœ… βœ… βœ… βœ…
CodeQL can scan Java projects without a build β˜‘οΈ β˜‘οΈ β˜‘οΈ βœ… βœ… βœ… βœ…
CodeQL can scan C# projects without a build β˜‘οΈ β˜‘οΈ βœ… βœ… βœ… βœ… βœ…
CodeQL dependency caching for advanced setup βœ… βœ… βœ… βœ… βœ… βœ…
Zstandard archive for CodeQL tools βœ… βœ… βœ… βœ… βœ… βœ…
Delegated alert dismissal for code scanning β˜‘οΈ βœ… βœ… βœ…
Code scanning alert-related events in audit log βœ… βœ… βœ… βœ…
Development section to track code scanning alert resolution progress βœ… βœ… βœ…
CodeQL code scanning to detect security vulnerabilities in GitHub Actions workflows βœ… βœ… βœ…
CodeQL Rust language support β˜‘οΈ βœ…
CodeQL can scan C/C++ projects without a build βœ…
Code scanning alert assignment β˜‘οΈ

Dependabot Alerts

Dependabot alerts tell you that your code depends on a package that is insecure.

Feature 3.14 3.15 3.16 3.17 3.18 3.19 3.20
Dependabot alerts show vulnerable function calls β˜‘οΈ β˜‘οΈ β˜‘οΈ
Dependabot auto-triage rules βœ… βœ… βœ… βœ… βœ… βœ… βœ…
Security advisories can use the new CVSS 4.0 schema to calculate a base vulnerability score βœ… βœ… βœ… βœ… βœ… βœ…
Added Exploit Prediction Scoring System (EPSS) to advisories to show estimated probability that a vulnerability will be exploited over the next 30 days βœ… βœ… βœ… βœ… βœ… βœ…
EPSS scores for vulnerability prioritization in Dependabot alerts βœ… βœ… βœ… βœ…
Dependabot metrics page for prioritizing security fixes βœ… βœ…

Dependabot Updates

Feature 3.14 3.15 3.16 3.17 3.18 3.19 3.20
Dependabot supports devcontainer.json files βœ… βœ… βœ… βœ… βœ… βœ… βœ…
Dependabot access to Cargo private registries βœ… βœ… βœ… βœ… βœ… βœ… βœ…
Dependabot pauses scheduled jobs after 15 failures. βœ… βœ… βœ… βœ… βœ… βœ… βœ…
Dependabot grouped security updates βœ… βœ… βœ… βœ… βœ… βœ… βœ…
Private registry support for target-branch configuration βœ… βœ… βœ… βœ… βœ… βœ… βœ…
Updates support pnpm workspace catalogs βœ… βœ… βœ… βœ… βœ… βœ…
Version updates support .NET SDK in global.json βœ… βœ… βœ… βœ… βœ… βœ…
Dependabot version updates support for bun dependencies βœ… βœ… βœ… βœ…
Dependabot version updates support for Docker Compose dependencies βœ… βœ… βœ… βœ…
Dependabot version updates support for uv dependencies βœ… βœ… βœ… βœ…
Organization administrators can grant Dependabot access to repositories at scale βœ… βœ… βœ…
Dependabot version updates support for Helm dependencies βœ… βœ… βœ…
Custom update frequencies for Dependabot using cron expressions βœ… βœ… βœ…
Dependabot supports Gradle lockfiles βœ… βœ…
Minimum package age configuration βœ… βœ…
Cross-ecosystem grouped pull requests βœ… βœ…
Central management of private registry configurations βœ… βœ…
Version updates support vcpkg dependencies and Rust toolchain βœ… βœ…
Dependabot can update private Go modules βœ… βœ…
Dependabot version updates support for Conda dependencies βœ…

Dependency Graph, Dependency Review and snapshot submission API

Dependency review helps you understand dependency changes and the security impact of these changes at every pull request.

Feature 3.14 3.15 3.16 3.17 3.18 3.19 3.20
SBOM generated for a package now includes the package URL for more packages βœ… βœ… βœ… βœ… βœ… βœ… βœ…

Security Overview

Security overview provides high-level summaries of the security status of an organization or enterprise and makes it easy to identify repositories that require intervention.

Feature 3.14 3.15 3.16 3.17 3.18 3.19 3.20
Enablement trends dashboard is available βœ… βœ… βœ… βœ… βœ… βœ… βœ…
Enterprise level secret scanning metrics and enablement trend dashboards βœ… βœ… βœ… βœ… βœ… βœ… βœ…
Security overview dashboard group by tool βœ… βœ… βœ… βœ… βœ… βœ… βœ…
Security overview dashboard filter by security tool β˜‘οΈ βœ… βœ… βœ… βœ… βœ… βœ…
CodeQL pull request alerts view βœ… βœ… βœ… βœ… βœ… βœ…
Security overview dashboard adds SAST vulnerabilities summary table βœ… βœ… βœ… βœ… βœ…
Security overview dashboard adds Prevention metrics alongside Detection and Remediation metrics at both the organization and enterprise levels βœ… βœ… βœ… βœ… βœ…
Export CSV data from the "CodeQL pull request alerts" view βœ… βœ… βœ… βœ… βœ…
Security overview dashboard accessibility enhancements βœ… βœ… βœ… βœ… βœ…

Administration

Security Configurations and Global Settings for Advanced Security configuration and policy enforcement at scale!

Feature 3.14 3.15 3.16 3.17 3.18 3.19 3.20
Enable at scale - security configurations βœ… βœ… βœ… βœ… βœ… βœ…
Enterprise-level security configurations βœ… βœ… βœ… βœ… βœ…
Security configurations for archived repositories βœ… βœ… βœ… βœ… βœ…
Advanced filtering for repository selection by security feature status βœ… βœ… βœ… βœ… βœ…
Security manager role can be assigned directly to individual users βœ… βœ… βœ… βœ… βœ…
Standalone SKUs for Code Security and Secret Protection βœ… βœ… βœ… βœ…
"Not set" option for security configurations βœ… βœ…
Security configurations support default or advanced CodeQL setup βœ… βœ…
Enterprise Security Manager role β˜‘οΈ
Code scanning default setup can override Actions policies βœ…

Dependencies

This section calls out the dependencies required to enable GitHub Advanced Security on GitHub Enterprise Server.

Feature GHAS license
required?
GitHub Actions
required?
GitHub Connect
required?
Documentation Notes
Security Overview

DescriptionKnow what needs attention throughout the entire SDLC
No * No No Feature Docs * Features not needing a GHAS license will still show up
Dependency Graph

DescriptionParse manifest and lock files in your repository
No No No Feature Docs Enabling this feature will reload some services on the appliance.
Dependabot Alerts

DescriptionKnow which of ☝️ have open CVEs
No No Yes Feature Docs GitHub Connect dependency and data transmission details
Dependabot Security Updates

DescriptionOne-click "enable all" to send PRs updating ☝️
No Yes Yes Feature Docs Requires a runner with Docker and internet connectivity to open PRs (specs)

As of GHES 3.8, will not require internet connectivity if private registry is configured
Dependabot Updates

DescriptionAllows Dependabot to process optional updates using ~/.github/dependabot.yml file
No Yes Yes Feature Docs Same requirements as ☝️ - this just allows the same "non-security" updates using the same flexible configuration file as GitHub.com
Dependency Review

DescriptionInspect dependencies at pull request, blocking merges that add more security vulnerabilities
Yes Yes Yes Feature Docs Does not require the build to be moved into GitHub Actions, but needs a runner to inspect manifests.

Dependency "snapshots" submitted through the dependency submission API for non-default branches are not supported on GitHub Enterprise Server.

Checking for licenses is not supported on GitHub Enterprise Server because the API does not return license information.
CodeQL

DescriptionHighly accurate static analysis tool, flexible and extensible query language
Yes No * No * Feature Docs * CodeQL can be installed in your existing build system (directions) and/or be used on GitHub Actions with self-hosted runners (directions)

* GitHub Connect is not required, but it makes keeping the CodeQL queries up-to-date easier.

* codeql-action-sync-tool is the offline updater without Connect.

* Code Scanning default setup requires runners with the code-scanning label applied.
Upload SARIF files from other tools

DescriptionView security results from other tools using SARIF file uploads
Yes No No Feature Docs Many other tools support the SARIF interchange format. This feature provides a single pane of glass into the entire codebase.
Secret scanning

DescriptionLook at the present and all history for secrets, including partner patterns and custom regex
Yes No No Feature Docs
Push protection for secrets

DescriptionBlock commits containing partner patterns and custom regex from GitHub, preventing compromise
Yes No No Feature Docs Bare metal hypervisors may require an additional CPU flag, as outlined here