Skip to content

Commit 34fd385

Browse files
authored
[EDI] Viewing metrics for Dependabot alerts (#59421)
1 parent 57a21fb commit 34fd385

File tree

6 files changed

+100
-27
lines changed

6 files changed

+100
-27
lines changed
Lines changed: 80 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,80 @@
1+
---
2+
title: About metrics for Dependabot alerts
3+
intro: Use metrics to track and prioritize {% data variables.product.prodname_dependabot_alerts %} across your organization.
4+
versions:
5+
feature: dependabot-metrics
6+
product: '{% data reusables.gated-features.security-overview-fpt-cs-only %}'
7+
permissions: '{% data reusables.permissions.security-overview-dependabot-metrics %}'
8+
topics:
9+
- Security overview
10+
- Code Security
11+
- Dependabot
12+
- Organizations
13+
- Alerts
14+
- Vulnerabilities
15+
shortTitle: Dependabot alert metrics
16+
contentType: concepts
17+
---
18+
19+
Metrics for {% data variables.product.prodname_dependabot_alerts %} help you understand the security posture of your organization's dependencies and track progress in resolving vulnerabilities. You can use these metrics to prioritize remediation efforts and focus on the most critical security issues.
20+
21+
Metrics for {% data variables.product.prodname_dependabot_alerts %} are available on your organization's security overview.
22+
23+
## Who can view metrics
24+
25+
You can see {% data variables.product.prodname_dependabot %} metrics if you have one of the permissions mentioned in the "Who can use this feature?" box at the top of the article.
26+
27+
## Ways the data can help you
28+
29+
The available metrics combine severity, exploitability, and patch availability to help you:
30+
31+
* **Prioritize alerts**: Focus on the most critical vulnerabilities that need immediate attention based on severity, exploitability scores, and patch availability.
32+
* **Track remediation progress**: Monitor how quickly your organization resolves vulnerabilities and identify trends over time.
33+
* **Identify high-risk dependencies**: Quickly spot packages that pose the greatest security risk across your repositories.
34+
* **Make data-driven decisions**: Allocate resources effectively by understanding which repositories and vulnerabilities require the most attention.
35+
36+
These metrics help both application security managers measure the effectiveness of their vulnerability management programs and developers identify which vulnerabilities they can fix immediately.
37+
38+
## Alert prioritization
39+
40+
The metrics dashboard shows the number of **open {% data variables.product.prodname_dependabot_alerts %}**. You can use filters such as availability of patches, severity, and EPSS score to narrow down the list of alerts to those matching specific criteria. {% data reusables.security-overview.dependabot-filters-link %}
41+
42+
For more information about how AppSec managers can best use these metrics to optimize alert fixing, see [AUTOTITLE](/code-security/securing-your-organization/understanding-your-organizations-exposure-to-vulnerabilities/prioritizing-dependabot-alerts-using-metrics).
43+
44+
Key metrics for prioritization include:
45+
46+
* **Severity**: The impact level of a vulnerability (critical, high, medium, or low)
47+
* **Exploitability**: How easily a vulnerability can be exploited in practice, including EPSS scores
48+
* **Dependency relationship**: Whether the vulnerable dependency is direct or transitive (indirect)
49+
* **Dependency scope**: Whether the vulnerability affects runtime dependencies, development dependencies, or both
50+
* **Actual usage**: Whether the vulnerable code is actually used in your application
51+
* **Patch availability**: Whether a fix is available for the vulnerability
52+
53+
## Alert resolution tracking
54+
55+
You can monitor how your organization resolves {% data variables.product.prodname_dependabot_alerts %} over time. Alert resolution metrics show the number of alerts:
56+
57+
* Fixed by {% data variables.product.prodname_dependabot %}
58+
* Manually dismissed
59+
* Auto-dismissed
60+
61+
This tile also displays the percent increase in the number of alerts closed in the last 30 days, providing visibility into remediation performance and helping you identify trends in vulnerability remediation.
62+
63+
## Highest-risk packages
64+
65+
The "Most vulnerabilities" tile shows the dependency that has the most vulnerabilities in your organization, along with a link to the related alerts across all your repositories. This helps you quickly identify which dependencies pose the greatest risk.
66+
67+
## Repository-level metrics
68+
69+
The repository breakdown table shows a summary of open alerts by repository, including:
70+
71+
* The total number of alerts per repository
72+
* Severity distribution (critical, high, medium, low)
73+
* Exploitability information (for example, EPSS > 1%)
74+
75+
This table can be sorted by each column, helping you identify which repositories are most at risk and prioritize remediation efforts accordingly.
76+
77+
## Further reading
78+
79+
* [AUTOTITLE](/code-security/how-tos/view-and-interpret-data/analyze-organization-data/viewing-metrics-for-dependabot-alerts)
80+
* [AUTOTITLE](/code-security/tutorials/manage-security-alerts/prioritizing-dependabot-alerts-using-metrics)

content/code-security/concepts/supply-chain-security/index.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -14,6 +14,7 @@ children:
1414
- about-the-dependency-graph
1515
- about-dependency-review
1616
- about-dependabot-alerts
17+
- about-metrics-for-dependabot-alerts
1718
- about-dependabot-security-updates
1819
- about-dependabot-version-updates
1920
- about-dependabot-pull-requests

content/code-security/concepts/vulnerability-reporting-and-management/about-your-exposure-to-vulnerabilities-in-your-code-and-in-dependencies.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ Regularly assessing your exposure to vulnerabilities is good practice to help id
3939

4040
* **{% data variables.product.prodname_dependabot %}** automatically monitors your project’s dependencies for vulnerabilities and outdated packages. When it detects a security issue or a new version, it creates pull requests to update the affected dependencies, helping you quickly address security risks and keep your software up to date. This reduces manual effort and helps ensure your project remains secure. See [AUTOTITLE](/code-security/getting-started/dependabot-quickstart-guide).
4141

42-
{% data variables.product.github %} provides a comprehensive set of {% data variables.product.prodname_dependabot %} metrics to help you monitor, prioritize, and remediate these risks across all repositories in your organization. See [AUTOTITLE](/code-security/security-overview/viewing-metrics-for-dependabot-alerts).
42+
{% data variables.product.github %} provides a comprehensive set of {% data variables.product.prodname_dependabot %} metrics to help you monitor, prioritize, and remediate these risks across all repositories in your organization. See [AUTOTITLE](/code-security/concepts/supply-chain-security/about-metrics-for-dependabot-alerts).
4343

4444
## Key tasks for AppSec managers
4545

content/code-security/how-tos/view-and-interpret-data/analyze-organization-data/viewing-metrics-for-dependabot-alerts.md

Lines changed: 13 additions & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ allowTitleToDifferFromFilename: true
55
intro: You can use security overview to see how many {% data variables.product.prodname_dependabot_alerts %} are in repositories across your organization, to prioritize the most critical alerts to fix, and to identify repositories where you may need to take action.
66
versions:
77
feature: dependabot-metrics
8-
permissions: '{% data reusables.permissions.security-overview %}'
8+
permissions: '{% data reusables.permissions.security-overview-dependabot-metrics %}'
99
product: '{% data reusables.gated-features.security-overview-fpt-cs-only %}'
1010
contentType: how-tos
1111
topics:
@@ -19,31 +19,9 @@ redirect_from:
1919
- /code-security/security-overview/viewing-metrics-for-dependabot-alerts
2020
---
2121

22-
## About metrics for {% data variables.product.prodname_dependabot %}
22+
You can view metrics for {% data variables.product.prodname_dependabot_alerts %} to track and prioritize vulnerabilities across your organization. For more information about the available metrics and how to use them, see [AUTOTITLE](/code-security/concepts/supply-chain-security/about-metrics-for-dependabot-alerts).
2323

24-
The metrics overview for {% data variables.product.prodname_dependabot %} provides valuable insights for both developers and application security (AppSec) managers. The data in the {% data variables.product.prodname_dependabot %} dashboard page contains a vulnerability prioritization funnel that helps with efficiently prioritizing, remediating, and tracking vulnerabilities across multiple repositories. This ensures that the most critical risks are addressed first and that security improvements can be measured over time.
25-
26-
For more information about how AppSec managers can best use these metrics to optimize alert fixing, see [AUTOTITLE](/code-security/securing-your-organization/understanding-your-organizations-exposure-to-vulnerabilities/prioritizing-dependabot-alerts-using-metrics).
27-
28-
You can see {% data variables.product.prodname_dependabot %} metrics if you have:
29-
30-
* The `admin` role for the repository.
31-
* A custom repository role with the "View {% data variables.product.prodname_dependabot_alerts %}" fine-grained permissions for the repository. For more information, see [AUTOTITLE](/organizations/managing-user-access-to-your-organizations-repositories/managing-repository-roles/about-custom-repository-roles#security).
32-
* Access to alerts for the repository. For more information, see [AUTOTITLE](/repositories/managing-your-repositorys-settings-and-features/enabling-features-for-your-repository/managing-security-and-analysis-settings-for-your-repository#granting-access-to-security-alerts).
33-
34-
The available metrics combine severity, exploitability, and patch availability, and help in the following ways:
35-
36-
* **Alert prioritization:** the chart shows the number of **open {% data variables.product.prodname_dependabot_alerts %}**. You can use filters, such as availability of patches, severity, EPSS score to narrow down the list of alerts to those matching the criteria. {% data reusables.security-overview.dependabot-filters-link %}
37-
38-
* **Remediation tracking:** The “Alerts closed” tile shows the number of alerts fixed with {% data variables.product.prodname_dependabot %}, manually dismissed, and auto dismissed, providing visibility into remediation performance and trends. The tile also shows the percent increase in the number of alerts closed in the last 30 days.
39-
40-
* **Highest-risk package:** The "Most vulnerabilities" tile shows the dependency that has the most vulnerabilities in the organization. The tile also provides a link to the related alerts across all your repositories.
41-
42-
* **Repository-level breakdown:** The table shows a breakdown of open alerts by repository, including counts by severity (critical, high, medium, low) and by exploitability (for example, EPSS > 1%), and can be sorted by each column. This helps you identify which projects are most at risk, prioritize remediation efforts where they matter most, and track progress over time at a granular level.
43-
44-
These metrics help managers measure the effectiveness of their vulnerability management and ensure compliance with organizational or regulatory timelines.
45-
46-
* **Actionable context for developers:** Developers can use the severity and patch availability filters to identify vulnerabilities they can fix immediately, reducing noise and focusing attention on issues they can address. These metrics help them understand the risk profile of their dependencies, enabling informed prioritization of work.
24+
This article explains how to access and view these metrics for your organization.
4725

4826
## Viewing metrics for {% data variables.product.prodname_dependabot %} for an organization
4927

@@ -66,3 +44,13 @@ The default funnel order is `has:patch, severity:critical,high, epss_percentage>
6644
1. Once you're done, click **Move** to save your changes.
6745

6846
>[!TIP] You can reset the funnel order back to the default settings by clicking **Reset to default** to the right of the graph.
47+
48+
## Using metrics effectively
49+
50+
Use {% data variables.product.prodname_dependabot %} metrics to:
51+
52+
* **Prioritize remediation**: Focus on critical and high-severity alerts that are easily exploitable. Developers can use severity and patch availability filters to identify vulnerabilities they can fix immediately, reducing noise and focusing attention on actionable issues.
53+
* **Monitor progress**: Track how quickly your organization resolves security vulnerabilities and measure the effectiveness of vulnerability management efforts.
54+
* **Make data-driven decisions**: Allocate resources based on actual risk and usage patterns. The repository-level breakdown helps you understand which projects are most at risk and where to focus remediation efforts.
55+
* **Identify trends**: Understand whether your security posture is improving over time and ensure compliance with organizational or regulatory timelines.
56+
* **Understand risk profiles**: Developers can use these metrics to understand the risk profile of their dependencies, enabling informed prioritization of work.

content/code-security/tutorials/manage-security-alerts/prioritizing-dependabot-alerts-using-metrics.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ Application Security (AppSec) managers often face a flood of {% data variables.p
3535
* **Alerts closed in the last 30 days, including the number of alerts fixed by {% data variables.product.prodname_dependabot %}, manually dismissed, and auto dismissed**: Tracks alert resolution progress. Illustrates how {% data variables.product.prodname_GH_code_security %} can help you detect vulnerabilities early.
3636
* **Table showing the total number of open alerts for each repository, as well as severity and expoitability data**: Allows you to dig deeper at the repository level.
3737

38-
For more information about these metrics, see [AUTOTITLE](/code-security/security-overview/viewing-metrics-for-dependabot-alerts).
38+
For more information about these metrics, see [AUTOTITLE](/code-security/concepts/supply-chain-security/about-metrics-for-dependabot-alerts).
3939

4040
Additionally, you can specify complex filters, which are combinations of the individual filters that are available. For more information about filters, see [{% data variables.product.prodname_dependabot %} dashboard view filters](/code-security/security-overview/filtering-alerts-in-security-overview#dependabot-dashboard-view-filters).
4141

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,4 @@
1+
Access requires:
2+
* The `admin` role for the repository.
3+
* A custom repository role with the "View {% data variables.product.prodname_dependabot_alerts %}" fine-grained permissions for the repository. For more information, see [AUTOTITLE](/organizations/managing-user-access-to-your-organizations-repositories/managing-repository-roles/about-custom-repository-roles#security).
4+
* Access to alerts for the repository. For more information, see [AUTOTITLE](/repositories/managing-your-repositorys-settings-and-features/enabling-features-for-your-repository/managing-security-and-analysis-settings-for-your-repository#granting-access-to-security-alerts).

0 commit comments

Comments
 (0)