Skip to main content

このバージョンの GitHub Enterprise サーバーはこの日付をもって終了となりました: 2026-04-23. 重大なセキュリティの問題に対してであっても、パッチリリースは作成されません。 パフォーマンスの向上、セキュリティの向上、新機能の向上を図るために、最新バージョンの GitHub Enterprise サーバーにアップグレードしてください。 アップグレードに関するヘルプについては、GitHub Enterprise サポートにお問い合わせください

Preparing for a security incident

Ensure you have the tools and processes in place to respond effectively to a security incident.

The guidance in this article is aimed at enterprise owners, organization owners, security managers and security teams. However, you will need to have the enterprise owner role to enable several of the features referenced in this article.

Introduction

When a security incident occurs, the ability to investigate what happened, understand the scope of impact, and contain the threat depends on having the right tools and processes already in place. This article brings together the key actions you should take before an incident occurs so that your team is equipped to respond quickly and effectively.

Set up critical tools in advance

The following investigative tooling is not available by default when you set up your GitHub enterprise. We strongly recommend enabling these features before any incident occurs.

These controls are critical for incident response, compliance, and operational transparency. Without them, your team can have major visibility gaps during an investigation, especially for API activity, Git activity, and long-running incidents where you need historical data.

Audit log streaming

You should stream the enterprise audit logs to a Security Information and Event Management (SIEM) system. This keeps a copy of your audit log data (including both audit events and Git events) in a system where you can run complex queries across large volumes of data and retain data beyond default retention periods.

This is critical in an incident because some high-value events are not visible in the GitHub audit log web UI, and logs are only available for a limited time unless you export and retain them externally.

With streamed logs, enterprise and organization owners can independently investigate activity from users, apps, tokens, and SSH keys, instead of depending on ad hoc data collection during an active response.

To set up audit log streaming, see 企業の監査ログのストリーミング.

Stream API request events

By default, the audit log stream won't include API request events. Enable API request streaming so that you can detect and investigate unauthorized API access or data exfiltration by compromised tokens or apps.

See Enabling audit log streaming of API requests.

Display IP addresses

By default, GitHub doesn't show source IP addresses in the enterprise audit log. During an investigation, source IPs help you verify whether activity from an actor (a user or app) came from a trusted or unfamiliar address.

Enterprises on GitHub Enterprise Cloud can enable IP address disclosure, see Enterprise の監査ログに IP アドレスを表示する.

Retain identity provider logs

If your enterprise uses SAML or OIDC authentication, adopt a similar retention strategy for your IdP logs.

Retained IdP logs help you investigate authentication activity and review provisioning and deprovisioning events over longer time windows, including incidents that unfold over months.

Familiarize yourself with tooling, limitations and common investigation areas

Before an incident occurs, review the GitHub tools and surfaces you can use during an investigation, and understand each tool's capabilities and limitations.

Familiarize yourself with:

Familiarize yourself with containment strategies

Before an incident occurs, review the immediate containment actions you might need. Planning these actions in advance with your security and operations teams helps you respond quickly, and means you can include clear guidance in your Security Incident Response Plan (SIRP).

Familiarize yourself with:

Prepare a Security Incident Response Plan (SIRP)

Create and maintain an up-to-date Security Incident Response Plan (SIRP) for your enterprise.

Your plan should define:

  • Roles and responsibilities
  • Escalation paths
  • Communication protocols
  • Severity classification criteria
  • Step-by-step response procedures for common threat types

Copilot can help you draft and refine this plan based on your team's needs and resources.

For guidance, see What is incident response.

Next steps