paint-brush
Using GitHub Protected Branches to Make SOC 2 Audits Suck Lessby@ajy
3,094 reads
3,094 reads

Using GitHub Protected Branches to Make SOC 2 Audits Suck Less

by AJMarch 4th, 2020
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

The software development process is an integral part of SOC 2 examinations. Enabling protected branches and implementing native security policies on these branches will make these audit experiences tolerable and less painful. GitHub defines protected branches in the following manner, “Protected branches ensure that collaborators on your repository cannot make irrevocable changes to branches.” Protecting a branch eliminates the risk of a planned or unplanned catastrophic event where a branch is deleted. This is the first step in enabling guardrails to secure your branch. Some additional checks or requirements can be enabled with a protected branch.
featured image - Using GitHub Protected Branches to Make SOC 2 Audits Suck Less
AJ HackerNoon profile picture
AJ

AJ

@ajy

L O A D I N G
. . . comments & more!

About Author

AJ HackerNoon profile picture
AJ@ajy

TOPICS

THIS ARTICLE WAS FEATURED IN...

Permanent on Arweave
Read on Terminal Reader
Read this story in a terminal
 Terminal
Read this story w/o Javascript
Read this story w/o Javascript
 Lite