Skip to main content

Planning a trial of GitHub Advanced Security

Ensure that your trial gives you the answers you need to make a decision on whether or not GitHub Advanced Security meets your business needs.

About trialing GitHub Advanced Security

You can trial GitHub Advanced Security independently, or working with an expert from GitHub or a partner organization. The primary audience for these articles is people who will plan and run their trial independently, typically small and medium-sized organizations.

Note

Although GitHub Advanced Security is free of charge during trials, you will be charged for any actions minutes that you use. That is, actions minutes used by the code scanning default setup or by any other workflows you run.

Existing GitHub Enterprise Cloud users

For more information, see Einrichten einer Testversion von GitHub Advanced Security in the GitHub Enterprise Cloud documentation.

Users on other GitHub plans

You can trial GitHub Advanced Security as part of a trial of GitHub Enterprise Cloud. For more information, see Eine Testversion von GitHub Enterprise einrichten in the GitHub Enterprise Cloud documentation.

When the trial ends

You can end your trial at any time by purchasing GitHub Advanced Security, and GitHub Enterprise if you don't already use it, or by canceling the trial. For more information, see What happens when the trial ends? in the GitHub Enterprise Cloud documentation.

Define your company goals

Before you start a trial of GitHub Advanced Security, you should define the purpose of the trial and identify the key questions you need to answer. Maintaining a strong focus on these goals will enable you to plan a trial that maximizes discovery and ensures that you have the information needed to decide whether or not to upgrade.

If your company already uses GitHub, consider what needs are currently unmet that GitHub Advanced Security might address. You should also consider your current application security posture and longer term aims. For inspiration, see Design Principles for Application security in the GitHub well-architected documentation.

Example needFeatures to explore during the trial
Enforce use of security featuresEnterprise-level security configurations and policies, see Informationen zu Sicherheitskonfigurationen and Informationen zu Unternehmensrichtlinien
Protect custom access tokensCustom patterns for secret scanning, delegated bypass for push protection, and validity checks, see Exploring your enterprise trial of secret scanning
Define and enforce a development processDependency review, auto-triage rules, rulesets, and policies, see Informationen zur Abhängigkeitsüberprüfung, Über Auto-Triage-Regeln von Dependabot, Informationen zu Regelsätzen, and Informationen zu Unternehmensrichtlinien
Reduce technical debt at scaleCode scanning and security campaigns, see Exploring your enterprise trial of code scanning
Monitor and track trends in security risksSecurity overview, see Einblicke in die Sicherheit anzeigen

If your company doesn't use GitHub yet, you are likely to have additional questions including how the platform handles data residency, secure account management, and repository migration. For more information, see Erste Schritte mit GitHub Enterprise Cloud.

Identify the members of your trial team

GitHub Advanced Security enables you to integrate security measures throughout the software development life cycle, so it's important to ensure that you include representatives from all areas of your development cycle. Otherwise you risk making a decision without having all the data you need. A trial includes 50 licenses which provides scope for representation from a wider range of people.

You may also find it helpful to identify a champion for each company need that you want to investigate.

Determine whether preliminary research is needed

If members of your trial team have not yet used the core features of GitHub Advanced Security, it may be helpful to add an experimentation phase in public repositories before you start a trial. Many of the primary features of code scanning and secret scanning can be used on public repositories. Having a good understanding of the core features will allow you to focus your trial period on private repositories, and exploring the additional features and control available with GitHub Advanced Security.

For more information, see Informationen zu Codescans, Informationen zur Lieferkettensicherheit, and Informationen zur Geheimnisüberprüfung.

Agree the organizations and repositories to test

Generally it is best to use an existing organization for a trial. This ensures that you can trial the features in repositories you know well and that accurately represent your coding environment. Once you start the trial, you may want to create additional organizations with test code to expand your explorations.

Be aware that deliberately insecure applications, such as WebGoat, may contain coding patterns that appear to be insecure, but which code scanning determines cannot be exploited. Code scanning typically generates fewer results for artificially insecure codebases than other static application security scanners.

Define the assessment criteria for the trial

For each company need or goal that you identify, determine what criteria you will measure to determine whether it is successfully met or not. For example, if one need is to enforce the use of security features, you might define a range of test cases for security configurations and policies to give you confidence that they enforce processes as you expect.

Next steps

  1. Eine Testversion von GitHub Enterprise einrichten
  2. Enabling security features in your trial enterprise
  3. Exploring your enterprise trial of secret scanning
  4. Exploring your enterprise trial of code scanning