
Size: a a a



- Use a credential manager to protect your access credentials.https://marcinhoppe.com/securing-your-github-project
- Configure two-factor authentication (2FA).
- Enforce signed commits.
- Protect the release branch.
- Require pull request reviews and approvals.
- Scan source code for sensitive data leaks.
- Scrub leaked secrets from git history.
- Only use trusted GitHub Actions.
- Protect the secrets used by GitHub Actions.
- Review project dependencies for vulnerabilities.
- Patch dependencies with vulnerabilities.
- Scan project source code for vulnerabilities.
- Publish a security policy.
- Collaborate on fixes for security vulnerabilities in private forks.
- Publish maintainer advisories for security fixes.




Most articles only cover the basics so we've attempted to create the "missing manual" for using environment variables in Linux and Mac.https://doppler.com/blog/how-to-set-environment-variables-in-linux-and-mac



Adopt Terraform to auto-provision infrastructure, and GitHub Flow to continuously test and deploy code
https://camillovisini.com/article/terragrunt-github-actions-aws-ecs

Detect, track and alert on infrastructure driftannouncing: https://driftctl.com/2020/12/22/announcing-driftctl





Upptime is the open-source uptime monitor and status page, powered entirely by GitHub Actions and Issues.https://github.com/upptime/upptime





