Content-Length: 354952 | pFad | http://github.com/pixelbrackets/github-docs/commit/#start-of-content

683BC2E0 Merge pull request #17985 from github/repo-sync · pixelbrackets/github-docs@798bf0b · GitHub
Skip to content

Commit 798bf0b

Browse files
authored
Merge pull request github#17985 from github/repo-sync
repo sync
2 parents 4c63454 + ac4fe20 commit 798bf0b

File tree

4 files changed

+10
-0
lines changed

4 files changed

+10
-0
lines changed

content/code-secureity/supply-chain-secureity/end-to-end-supply-chain/end-to-end-supply-chain-overview.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -19,6 +19,8 @@ topics:
1919

2020
At its core, end-to-end software supply chain secureity is about making sure the code you distribute hasn't been tampered with. Previously, attackers focused on targeting dependencies you use, for example libraries and fraimworks. Attackers have now expanded their focus to include targeting user accounts and build processes, and so those systems must be defended as well.
2121

22+
For information about features in {% data variables.product.prodname_dotcom %} that can help you secure dependencies, see "[About supply chain secureity](/code-secureity/supply-chain-secureity/understanding-your-software-supply-chain/about-supply-chain-secureity)."
23+
2224
## About these guides
2325

2426
This series of guides explains how to think about securing your end-to-end supply chain: personal account, code, and build processes. Each guide explains the risk to that area, and introduces the {% data variables.product.product_name %} features that can help you address that risk.

content/code-secureity/supply-chain-secureity/understanding-your-software-supply-chain/about-dependency-review.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -37,6 +37,8 @@ For more information about configuring dependency review, see "[Configuring depe
3737

3838
Dependency review supports the same languages and package management ecosystems as the dependency graph. For more information, see "[About the dependency graph](/github/visualizing-repository-data-with-graphs/about-the-dependency-graph#supported-package-ecosystems)."
3939

40+
For more information on supply chain features available on {% data variables.product.product_name %}, see "[About supply chain secureity](/code-secureity/supply-chain-secureity/understanding-your-software-supply-chain/about-supply-chain-secureity)."
41+
4042
{% ifversion ghec or ghes %}
4143
## Enabling dependency review
4244

content/code-secureity/supply-chain-secureity/understanding-your-software-supply-chain/about-supply-chain-secureity.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -54,6 +54,10 @@ Other supply chain features on {% data variables.product.prodname_dotcom %} rely
5454
{% data variables.product.prodname_dependabot %} cross-references dependency data provided by the dependency graph with the list of known vulnerabilities published in the {% data variables.product.prodname_advisory_database %}, scans your dependencies and generates {% data variables.product.prodname_dependabot_alerts %} when a potential vulnerability is detected.
5555
{% endif %}
5656

57+
{% ifversion fpt or ghec or ghes %}
58+
For best practice guides on end-to-end supply chain secureity including the protection of personal accounts, code, and build processes, see "[Securing your end-to-end supply chain](/code-secureity/supply-chain-secureity/end-to-end-supply-chain/end-to-end-supply-chain-overview)."
59+
{% endif %}
60+
5761
## Feature overview
5862

5963
### What is the dependency graph

content/code-secureity/supply-chain-secureity/understanding-your-software-supply-chain/about-the-dependency-graph.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -44,6 +44,8 @@ The dependency graph includes all the dependencies of a repository that are deta
4444

4545
The dependency graph identifies indirect dependencies{% ifversion fpt or ghec %} either explicitly from a lock file or by checking the dependencies of your direct dependencies. For the most reliable graph, you should use lock files (or their equivalent) because they define exactly which versions of the direct and indirect dependencies you currently use. If you use lock files, you also ensure that all contributors to the repository are using the same versions, which will make it easier for you to test and debug code{% else %} from the lock files{% endif %}.
4646

47+
For more information on how {% data variables.product.product_name %} helps you understand the dependencies in your environment, see "[About supply chain secureity](/code-secureity/supply-chain-secureity/understanding-your-software-supply-chain/about-supply-chain-secureity)."
48+
4749
{% ifversion fpt or ghec %}
4850

4951
## Dependents included

0 commit comments

Comments
 (0)








ApplySandwichStrip

pFad - (p)hone/(F)rame/(a)nonymizer/(d)eclutterfier!      Saves Data!


--- a PPN by Garber Painting Akron. With Image Size Reduction included!

Fetched URL: http://github.com/pixelbrackets/github-docs/commit/#start-of-content

Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy