Skip to content

Commit 73a956c

Browse files
CalinLCopilot
andauthored
Update docs/08-security-compliance.md
Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com>
1 parent ef6859f commit 73a956c

1 file changed

Lines changed: 1 addition & 1 deletion

File tree

docs/08-security-compliance.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -65,7 +65,7 @@ Implementing GHAS across enterprise organizations requires standardized security
6565

6666
**Baseline Security Policies**: Establish minimum security standards across all organizations through enterprise policies. These may include mandatory code scanning on critical repositories, mandatory secret scanning with push protection, and required dependency vulnerability reviews before merge.
6767

68-
**Organization Inheritance Hierarchy**: As described in [Policy Inheritance Architecture (Doc 06)](./06-policy-inheritance.md), security configurations flow from enterprise to organization to repository levels. GHAS enablement policies cascade through this hierarchy, with organizations inheriting enterprise mandates while adding organization-specific controls.
68+
**Organization Inheritance Hierarchy**: As described in [Policy Inheritance Architecture](./06-policy-inheritance.md), security configurations flow from enterprise to organization to repository levels. GHAS enablement policies cascade through this hierarchy, with organizations inheriting enterprise mandates while adding organization-specific controls.
6969

7070
**Tiered Implementation Levels**: Organizations should classify repositories into tiers (critical, important, standard) and apply proportionate security scanning configurations. Critical repositories might require all GHAS features with strict blocking policies, while standard repositories enable core scanning with advisory-only configurations.
7171

0 commit comments

Comments
 (0)