Upgrade to Pro
— share decks privately, control downloads, hide ads and more …
Speaker Deck
Features
Speaker Deck
PRO
Sign in
Sign up for free
Search
Search
How GitHub Uses GitHub to Defend GitHub
Search
Scott J. Roberts
February 24, 2014
Technology
3
340
How GitHub Uses GitHub to Defend GitHub
A talk I gave for a closed conference right around RSA 2014.
Scott J. Roberts
February 24, 2014
Tweet
Share
More Decks by Scott J. Roberts
See All by Scott J. Roberts
LLM SATs FTW
sroberts
0
980
STRAT - A System-Centric Approach to Cyber Resilience
sroberts
0
56
Tortured Responders Dept - Scott & Rebekah's Edition
sroberts
0
140
Skynet the CTI Intern: Building Effective Machine Augmented Intelligence
sroberts
0
160
DRIVING INTELLIGENCE WITH MITRE ATT&CK: LEVERAGING LIMITED RESOURCES TO BUILD AN EVOLVING THREAT REPOSITORY
sroberts
0
98
Exploring Threat Intelligence: Insights and Tools from Vertex Synapse
sroberts
0
94
Homemade Ramen & Threat Intelligence
sroberts
2
580
Introduction to Open Source Security Tools
sroberts
3
5k
Building Effective Threat Intelligence Sharing
sroberts
1
130
Other Decks in Technology
See All in Technology
仕様書駆動AI開発の実践: Issue→Skill→PRテンプレで 再現性を作る
knishioka
2
620
学生・新卒・ジュニアから目指すSRE
hiroyaonoe
2
580
OCI Database Management サービス詳細
oracle4engineer
PRO
1
7.4k
会社紹介資料 / Sansan Company Profile
sansan33
PRO
15
400k
広告の効果検証を題材にした因果推論の精度検証について
zozotech
PRO
0
150
Codex 5.3 と Opus 4.6 にコーポレートサイトを作らせてみた / Codex 5.3 vs Opus 4.6
ama_ch
0
110
20260204_Midosuji_Tech
takuyay0ne
1
140
クレジットカード決済基盤を支えるSRE - 厳格な監査とSRE運用の両立 (SRE Kaigi 2026)
capytan
6
2.7k
今日から始めるAmazon Bedrock AgentCore
har1101
4
400
GSIが複数キー対応したことで、俺達はいったい何が嬉しいのか?
smt7174
3
150
Kiro IDEのドキュメントを全部読んだので地味だけどちょっと嬉しい機能を紹介する
khmoryz
0
170
SREが向き合う大規模リアーキテクチャ 〜信頼性とアジリティの両立〜
zepprix
0
430
Featured
See All Featured
ピンチをチャンスに:未来をつくるプロダクトロードマップ #pmconf2020
aki_iinuma
128
55k
GraphQLの誤解/rethinking-graphql
sonatard
74
11k
Why You Should Never Use an ORM
jnunemaker
PRO
61
9.7k
Making the Leap to Tech Lead
cromwellryan
135
9.7k
The Impact of AI in SEO - AI Overviews June 2024 Edition
aleyda
5
730
Bash Introduction
62gerente
615
210k
The Straight Up "How To Draw Better" Workshop
denniskardys
239
140k
End of SEO as We Know It (SMX Advanced Version)
ipullrank
3
3.9k
Avoiding the “Bad Training, Faster” Trap in the Age of AI
tmiket
0
72
CoffeeScript is Beautiful & I Never Want to Write Plain JavaScript Again
sstephenson
162
16k
[SF Ruby Conf 2025] Rails X
palkan
1
740
Chasing Engaging Ingredients in Design
codingconduct
0
110
Transcript
! To Defend Scott J Roberts Bad Guy Catcher Uses
How
this isn’t a sales pitch… but it is about using
GitHub the product
Our Goals • Use current tools & paradigms • Fast
• Secure • Transparent to coworkers
We live on GitHub (shocking!) • Writing code • Writing
documentation • Having long running collaborative discussions • So why not incident response?
Our Incident Process • Create an incident name • Create
an incident branch • Apply the Incident Template • Open a Pull Request • “Run it down” • Finalize & Merge • it
Create an incident name • Two word names • First
word is “actor” - to the extent we know • Second word is the incident • Initials should be unique
Create an “Incident Branch”
Add Incident Template
Our Templates
Our Templates
Git Add, Commit, & Push
Open a Pull Request
Open a Pull Request
“Run it down”
“Run it down” • Using the Pull Request workflow for
IR: • Ties response directly to the code, such as fixes • Allows us to pull in relevant users & teams as necessary • Lets us categorize, organize, & track using Milestones, Labels, & States
Finalize and Merge
it • We share GitHub security incidents with all Hubbers
• This helps us with a few things: • Raising OpSec awareness • Identifying & developing new features • Building user trust
Quick Review 1. Create a branch 2. Add & fill
out template 3. Add, commit, & push 4. Open a Pull Request 5. “Run it down” 6. Finalize & Merge
Wake Up, Go T o War