: Begin Scanning a GitHub V2 App
Focus
Focus

Begin Scanning a GitHub V2 App

Table of Contents

Begin Scanning a GitHub V2 App

Authorize
Data Security
to connect to GitHub to scan all content shared within the app.
You can connect a GitHub to
Data Security
to scan for public exposure of repository folders or source code files to ensure your company’s proprietary information is secure. With GitHub, you can control if
Data Security
scans a collection of owner accounts connected to an organization or a single owner account.
To connect GitHub to
Data Security
and begin scanning assets, you need to:
Support for automated remediation capabilities varies by SaaS application.

Add GitHub V2 App

In order for
Data Security
to scan assets, you must consent to specific permissions during adding the GitHub V2 App.
  1. To add the GitHub V2 app, go to
    Data Security
    Applications
    Add Application
    GitHub
    .
  2. Click
    Connect to GitHub Account
    , then sign in with a GitHub account that has Owner privileges.
  3. Choose which repositories you want
    Data Security
    to scan:
    • (Recommended) If your GitHub account is part of an organization,
      Grant
      Data Security
      Organization access
      to scan your organization’s current and future repositories.
    • Selectively choose which repositories you want
      Data Security
      to scan.
  4. Authorize
    Data Security
    (listed as
    PAN ShieldArc
    ) access to your GitHub account.
  5. Verify that you successfully granted
    Third-Party application access policy
    to
    Data Security
    .

Troubleshooting Onboarding for GitHub V2 App

To ensure that your app has onboarded correctly without any issues in authentication or permissions, Data Security performs validation checks between the onboarding and scanning process. You can start scanning only after a successful validation. For GitHub V2, the following validations happen:
  • App Authentication
  • Validating Permissions
After the validation is successful, Data Security displays the sample data assets.
If the
App Authentication
or
Validating Permissions
check fails, try the following:
  1. Ensure you have administrator permissions.
  2. Go to your
    GitHub app directory
    and check if your Palo Alto Networks application is listed in the list of
    Installed Apps
    . Following are the app names for specific regions:
    • India region: SAAS Security API IN
    • Australia region: SaaS Security GITHUB-AUS
    • Japan region: SaaS Security GITHUB-JP
    • UK region: SaaS Security GITHUB-UK
    • EU region: SaaS Security API - EU
    • APAC region: SaaS Security API - APAC
    • US region: SaaS Security API - NAM
Handling Errors
To understand your error messages and ways to resolve them, see:
The other most common issues related to onboarding a GitHub V2 App are as follows:
Symptom
Explanation
Solution
Data Security
does not create assets during forward scanning.
Existing
Data Security
account will not create asset during forward scan due to a mismatch in installation ID. Thus, assets are created only during backward scanning.
For assets to be created during forward scanning also, uninstall the existing
Data Security
app from your GitHub account/organization manually and perform a fresh onboarding to install
Data Security
again.
Data Security
web interface does not display assets that are associated with new branches.
For performance reasons,
Data Security
only scans the default branch of the repository, not all branches of the repository.
This is expected behavior.
Data Security
web interface does not display assets for a newly created repository.
You likely did not grant Organization access as outlined in Add GitHub V2 App.
Reauthenticate and authorize access to the new repository or grant Organization access.
If the issue persists, contact SaaS Security Technical Support.

Start Scanning and Monitor Results

When you add a new cloud app, then enable scanning,
Data Security
automatically scans the cloud app against the default data patterns and displays the match occurrences. You can take action now to improve your scan results and identify risks.
  1. To Start scanning the new GitHub V2 App for risks, go to
    Data Security
    Applications
    GitHub
    Enable Scanning
    .
  2. During the discovery phase, as
    Data Security
    scans files and matches them against enabled policy rules:
    • Verify that SaaS Security web interface displays assets.
    • Verify that your default policy rules are effective. If the results don’t capture all the risks or you see false positives, proceed to next step to improve your results.
  3. (
    Optional
    ) Modify match criteria for existing policy rules.
  4. (
    Optional
    ) Add new policy rules.
    Consider the business use of your cloud app, then identify risks unique to your enterprise. As necessary, add new:
  5. (
    Optional
    ) Configure or edit a data pattern.
    You can Configure Data Patterns to identify specific strings of text, characters, words, or patterns to make it possible to find all instances of text that match a data pattern you specify.

Recommended For You