[Feature Request] Custom Severity Overrides and SLA Management for GitHub Advanced Security #189023
Replies: 2 comments
-
|
💬 Your Product Feedback Has Been Submitted 🎉 Thank you for taking the time to share your insights with us! Your feedback is invaluable as we build a better GitHub experience for all our users. Here's what you can expect moving forward ⏩
Where to look to see what's shipping 👀
What you can do in the meantime 💻
As a member of the GitHub community, your participation is essential. While we can't promise that every suggestion will be implemented, we want to emphasize that your feedback is instrumental in guiding our decisions and priorities. Thank you once again for your contribution to making GitHub even better! We're grateful for your ongoing support and collaboration in shaping the future of our platform. ⭐ |
Beta Was this translation helpful? Give feedback.
-
|
For reference there is this request with a response from a GH representative. https://github.com/orgs/community/discussions/43777 |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
Select Topic Area
Product Feedback
Body
Overview of request
Currently, GitHub alerts (dependabot, code scanning) rely on static severity ratings (Critical, High, Medium, Low). We're requesting the ability for organizations or enterprises to:
1. Custom Severity Overrides
CVE's are not the best determination of criticality for certain types of issues. On triage for example, we've found Dependabot alerts that are listed as critical but the entrypoint for the vulnerability is unreachable OR 5 layers deep inside of a transitive dependancy. The only tool for security teams right now is to dismiss these alerts (basically just ignore the problem) but some of us would prefer to lower the criticality of the alert.
Main pain points:
2. Service Level Agreements (SLAs)
Security teams in Enterprises and Organizations must use external spreadsheets or third-party tools like JIRA to track if developers are meeting remediation timelines (SLAs), as GitHub lacks native "Time-to-Remediate" countdowns or escalations.
Developers have no timeline or push to drive them to fix issues.
Proposal
1. Severity Adjustment (Triage)
2. SLA Management Framework
Introduce a settings pane at the Organization/Enterprise level to define remediation windows E.g:
Potentially, this could be configurable based on the type of alert i.e. secret scanning / dependabot / code scanning.
3. Automated Warnings & Escalations
Escalation: Ability for security team to retrieve SLA breached alerts and escalate them (perhaps by taking over major parts of the main repo page or just fetching them via an API and escalating on a 3rd party tool like JIRA/Slack/Teams etc)
For business value, I think this will give teams a lot more control and the following benefits:
Improved Security Posture: Teams focus on the risks that actually matter to the organization.
Compliance: Makes it easier to prove to auditors that the organization is adhering to its own internal security policies.
Operational Efficiency: Reduces the noise for developers, leading to higher adoption of GitHub Advanced Security tools.
Beta Was this translation helpful? Give feedback.
All reactions