paint-brush
Using GitHub Protected Branches to Make SOC 2 Audits Suck Lessby@ajy
3,083 reads
3,083 reads

Using GitHub Protected Branches to Make SOC 2 Audits Suck Less

by AJ3mMarch 4th, 2020
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

The software development process is an integral part of SOC 2 examinations. Enabling protected branches and implementing native security policies on these branches will make these audit experiences tolerable and less painful. GitHub defines protected branches in the following manner, “Protected branches ensure that collaborators on your repository cannot make irrevocable changes to branches.” Protecting a branch eliminates the risk of a planned or unplanned catastrophic event where a branch is deleted. This is the first step in enabling guardrails to secure your branch. Some additional checks or requirements can be enabled with a protected branch.

Company Mentioned

Mention Thumbnail
featured image - Using GitHub Protected Branches to Make SOC 2 Audits Suck Less
AJ HackerNoon profile picture
AJ

AJ

@ajy

cloud security is fun

About @ajy
LEARN MORE ABOUT @AJY'S
EXPERTISE AND PLACE ON THE INTERNET.
L O A D I N G
. . . comments & more!

About Author

AJ HackerNoon profile picture
AJ@ajy
cloud security is fun

TOPICS

THIS ARTICLE WAS FEATURED IN...

Permanent on Arweave
Read on Terminal Reader
Read this story in a terminal
 Terminal
Read this story w/o Javascript
Read this story w/o Javascript
 Lite