Skip to content

Latest commit

 

History

History

outside_collaborators

Folders and files

NameName
Last commit message
Last commit date

parent directory

..
 
 
 
 
 
 

GitHub Unpermitted Outside Collaborators

What It Does

This policy template reports on any outside collaborators under the user-specified GitHub organizations, ignoring the users in the User Allow List parameter. Optionally, it emails this report.

Input Parameters

  • Email Addresses - A list of email addresses to notify.
  • GitHub Organizations - A list of GitHub Organizations to check.
  • Allow/Deny GitHub Repositories - Whether to treat Allow/Deny GitHub Repositories List parameter as allow or deny list. Has no effect if Allow/Deny GitHub Repositories List is left empty.
  • Allow/Deny GitHub Repositories List - Filter results by GitHub repository, either only allowing this list or denying it depending on how the above parameter is set. Leave blank to consider all the GitHub repositories in the specified organizations.
  • User Allow List - GitHub user accounts to exclude from the results.

Policy Actions

  • Sends an email notification.

Prerequisites

This Policy Template uses Credentials for authenticating to datasources -- in order to apply this policy you must have a Credential registered in the system that is compatible with this policy. If there are no Credentials listed when you apply the policy, please contact your Flexera Org Admin and ask them to register a Credential that is compatible with this policy. The information below should be consulted when creating the credential(s).

  • GitHub Credential (provider=github) which has the following permissions:

    • admin:org
  • Flexera Credential (provider=flexera) which has the following roles:

    • billing_center_viewer

The Provider-Specific Credentials page in the docs has detailed instructions for setting up Credentials for the most common providers.

Supported Clouds

  • GitHub

Cost

This policy template does not incur any cloud costs.