You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
intro: Use metrics to track and prioritize {% data variables.product.prodname_dependabot_alerts %} across your organization.
4
+
versions:
5
+
feature: dependabot-metrics
6
+
product: '{% data reusables.gated-features.security-overview-fpt-cs-only %}'
7
+
permissions: '{% data reusables.permissions.security-overview-dependabot-metrics %}'
8
+
topics:
9
+
- Security overview
10
+
- Code Security
11
+
- Dependabot
12
+
- Organizations
13
+
- Alerts
14
+
- Vulnerabilities
15
+
shortTitle: Dependabot alert metrics
16
+
contentType: concepts
17
+
---
18
+
19
+
Metrics for {% data variables.product.prodname_dependabot_alerts %} help you understand the security posture of your organization's dependencies and track progress in resolving vulnerabilities. You can use these metrics to prioritize remediation efforts and focus on the most critical security issues.
20
+
21
+
Metrics for {% data variables.product.prodname_dependabot_alerts %} are available on your organization's security overview.
22
+
23
+
## Who can view metrics
24
+
25
+
You can see {% data variables.product.prodname_dependabot %} metrics if you have one of the permissions mentioned in the "Who can use this feature?" box at the top of the article.
26
+
27
+
## Ways the data can help you
28
+
29
+
The available metrics combine severity, exploitability, and patch availability to help you:
30
+
31
+
***Prioritize alerts**: Focus on the most critical vulnerabilities that need immediate attention based on severity, exploitability scores, and patch availability.
32
+
***Track remediation progress**: Monitor how quickly your organization resolves vulnerabilities and identify trends over time.
33
+
***Identify high-risk dependencies**: Quickly spot packages that pose the greatest security risk across your repositories.
34
+
***Make data-driven decisions**: Allocate resources effectively by understanding which repositories and vulnerabilities require the most attention.
35
+
36
+
These metrics help both application security managers measure the effectiveness of their vulnerability management programs and developers identify which vulnerabilities they can fix immediately.
37
+
38
+
## Alert prioritization
39
+
40
+
The metrics dashboard shows the number of **open {% data variables.product.prodname_dependabot_alerts %}**. You can use filters such as availability of patches, severity, and EPSS score to narrow down the list of alerts to those matching specific criteria. {% data reusables.security-overview.dependabot-filters-link %}
41
+
42
+
For more information about how AppSec managers can best use these metrics to optimize alert fixing, see [AUTOTITLE](/code-security/securing-your-organization/understanding-your-organizations-exposure-to-vulnerabilities/prioritizing-dependabot-alerts-using-metrics).
43
+
44
+
Key metrics for prioritization include:
45
+
46
+
***Severity**: The impact level of a vulnerability (critical, high, medium, or low)
47
+
***Exploitability**: How easily a vulnerability can be exploited in practice, including EPSS scores
48
+
***Dependency relationship**: Whether the vulnerable dependency is direct or transitive (indirect)
49
+
***Dependency scope**: Whether the vulnerability affects runtime dependencies, development dependencies, or both
50
+
***Actual usage**: Whether the vulnerable code is actually used in your application
51
+
***Patch availability**: Whether a fix is available for the vulnerability
52
+
53
+
## Alert resolution tracking
54
+
55
+
You can monitor how your organization resolves {% data variables.product.prodname_dependabot_alerts %} over time. Alert resolution metrics show the number of alerts:
56
+
57
+
* Fixed by {% data variables.product.prodname_dependabot %}
58
+
* Manually dismissed
59
+
* Auto-dismissed
60
+
61
+
This tile also displays the percent increase in the number of alerts closed in the last 30 days, providing visibility into remediation performance and helping you identify trends in vulnerability remediation.
62
+
63
+
## Highest-risk packages
64
+
65
+
The "Most vulnerabilities" tile shows the dependency that has the most vulnerabilities in your organization, along with a link to the related alerts across all your repositories. This helps you quickly identify which dependencies pose the greatest risk.
66
+
67
+
## Repository-level metrics
68
+
69
+
The repository breakdown table shows a summary of open alerts by repository, including:
70
+
71
+
* The total number of alerts per repository
72
+
* Severity distribution (critical, high, medium, low)
73
+
* Exploitability information (for example, EPSS > 1%)
74
+
75
+
This table can be sorted by each column, helping you identify which repositories are most at risk and prioritize remediation efforts accordingly.
Copy file name to clipboardExpand all lines: content/code-security/concepts/vulnerability-reporting-and-management/about-your-exposure-to-vulnerabilities-in-your-code-and-in-dependencies.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -39,7 +39,7 @@ Regularly assessing your exposure to vulnerabilities is good practice to help id
39
39
40
40
***{% data variables.product.prodname_dependabot %}** automatically monitors your project’s dependencies for vulnerabilities and outdated packages. When it detects a security issue or a new version, it creates pull requests to update the affected dependencies, helping you quickly address security risks and keep your software up to date. This reduces manual effort and helps ensure your project remains secure. See [AUTOTITLE](/code-security/getting-started/dependabot-quickstart-guide).
41
41
42
-
{% data variables.product.github %} provides a comprehensive set of {% data variables.product.prodname_dependabot %} metrics to help you monitor, prioritize, and remediate these risks across all repositories in your organization. See [AUTOTITLE](/code-security/security-overview/viewing-metrics-for-dependabot-alerts).
42
+
{% data variables.product.github %} provides a comprehensive set of {% data variables.product.prodname_dependabot %} metrics to help you monitor, prioritize, and remediate these risks across all repositories in your organization. See [AUTOTITLE](/code-security/concepts/supply-chain-security/about-metrics-for-dependabot-alerts).
Copy file name to clipboardExpand all lines: content/code-security/how-tos/view-and-interpret-data/analyze-organization-data/viewing-metrics-for-dependabot-alerts.md
intro: You can use security overview to see how many {% data variables.product.prodname_dependabot_alerts %} are in repositories across your organization, to prioritize the most critical alerts to fix, and to identify repositories where you may need to take action.
6
6
versions:
7
7
feature: dependabot-metrics
8
-
permissions: '{% data reusables.permissions.security-overview %}'
8
+
permissions: '{% data reusables.permissions.security-overview-dependabot-metrics %}'
9
9
product: '{% data reusables.gated-features.security-overview-fpt-cs-only %}'
## About metrics for {% data variables.product.prodname_dependabot %}
22
+
You can view metrics for {% data variables.product.prodname_dependabot_alerts %} to track and prioritize vulnerabilities across your organization. For more information about the available metrics and how to use them, see [AUTOTITLE](/code-security/concepts/supply-chain-security/about-metrics-for-dependabot-alerts).
23
23
24
-
The metrics overview for {% data variables.product.prodname_dependabot %} provides valuable insights for both developers and application security (AppSec) managers. The data in the {% data variables.product.prodname_dependabot %} dashboard page contains a vulnerability prioritization funnel that helps with efficiently prioritizing, remediating, and tracking vulnerabilities across multiple repositories. This ensures that the most critical risks are addressed first and that security improvements can be measured over time.
25
-
26
-
For more information about how AppSec managers can best use these metrics to optimize alert fixing, see [AUTOTITLE](/code-security/securing-your-organization/understanding-your-organizations-exposure-to-vulnerabilities/prioritizing-dependabot-alerts-using-metrics).
27
-
28
-
You can see {% data variables.product.prodname_dependabot %} metrics if you have:
29
-
30
-
* The `admin` role for the repository.
31
-
* A custom repository role with the "View {% data variables.product.prodname_dependabot_alerts %}" fine-grained permissions for the repository. For more information, see [AUTOTITLE](/organizations/managing-user-access-to-your-organizations-repositories/managing-repository-roles/about-custom-repository-roles#security).
32
-
* Access to alerts for the repository. For more information, see [AUTOTITLE](/repositories/managing-your-repositorys-settings-and-features/enabling-features-for-your-repository/managing-security-and-analysis-settings-for-your-repository#granting-access-to-security-alerts).
33
-
34
-
The available metrics combine severity, exploitability, and patch availability, and help in the following ways:
35
-
36
-
***Alert prioritization:** the chart shows the number of **open {% data variables.product.prodname_dependabot_alerts %}**. You can use filters, such as availability of patches, severity, EPSS score to narrow down the list of alerts to those matching the criteria. {% data reusables.security-overview.dependabot-filters-link %}
37
-
38
-
***Remediation tracking:** The “Alerts closed” tile shows the number of alerts fixed with {% data variables.product.prodname_dependabot %}, manually dismissed, and auto dismissed, providing visibility into remediation performance and trends. The tile also shows the percent increase in the number of alerts closed in the last 30 days.
39
-
40
-
***Highest-risk package:** The "Most vulnerabilities" tile shows the dependency that has the most vulnerabilities in the organization. The tile also provides a link to the related alerts across all your repositories.
41
-
42
-
***Repository-level breakdown:** The table shows a breakdown of open alerts by repository, including counts by severity (critical, high, medium, low) and by exploitability (for example, EPSS > 1%), and can be sorted by each column. This helps you identify which projects are most at risk, prioritize remediation efforts where they matter most, and track progress over time at a granular level.
43
-
44
-
These metrics help managers measure the effectiveness of their vulnerability management and ensure compliance with organizational or regulatory timelines.
45
-
46
-
***Actionable context for developers:** Developers can use the severity and patch availability filters to identify vulnerabilities they can fix immediately, reducing noise and focusing attention on issues they can address. These metrics help them understand the risk profile of their dependencies, enabling informed prioritization of work.
24
+
This article explains how to access and view these metrics for your organization.
47
25
48
26
## Viewing metrics for {% data variables.product.prodname_dependabot %} for an organization
49
27
@@ -66,3 +44,13 @@ The default funnel order is `has:patch, severity:critical,high, epss_percentage>
66
44
1. Once you're done, click **Move** to save your changes.
67
45
68
46
>[!TIP] You can reset the funnel order back to the default settings by clicking **Reset to default** to the right of the graph.
47
+
48
+
## Using metrics effectively
49
+
50
+
Use {% data variables.product.prodname_dependabot %} metrics to:
51
+
52
+
***Prioritize remediation**: Focus on critical and high-severity alerts that are easily exploitable. Developers can use severity and patch availability filters to identify vulnerabilities they can fix immediately, reducing noise and focusing attention on actionable issues.
53
+
***Monitor progress**: Track how quickly your organization resolves security vulnerabilities and measure the effectiveness of vulnerability management efforts.
54
+
***Make data-driven decisions**: Allocate resources based on actual risk and usage patterns. The repository-level breakdown helps you understand which projects are most at risk and where to focus remediation efforts.
55
+
***Identify trends**: Understand whether your security posture is improving over time and ensure compliance with organizational or regulatory timelines.
56
+
***Understand risk profiles**: Developers can use these metrics to understand the risk profile of their dependencies, enabling informed prioritization of work.
Copy file name to clipboardExpand all lines: content/code-security/tutorials/manage-security-alerts/prioritizing-dependabot-alerts-using-metrics.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -35,7 +35,7 @@ Application Security (AppSec) managers often face a flood of {% data variables.p
35
35
***Alerts closed in the last 30 days, including the number of alerts fixed by {% data variables.product.prodname_dependabot %}, manually dismissed, and auto dismissed**: Tracks alert resolution progress. Illustrates how {% data variables.product.prodname_GH_code_security %} can help you detect vulnerabilities early.
36
36
***Table showing the total number of open alerts for each repository, as well as severity and expoitability data**: Allows you to dig deeper at the repository level.
37
37
38
-
For more information about these metrics, see [AUTOTITLE](/code-security/security-overview/viewing-metrics-for-dependabot-alerts).
38
+
For more information about these metrics, see [AUTOTITLE](/code-security/concepts/supply-chain-security/about-metrics-for-dependabot-alerts).
39
39
40
40
Additionally, you can specify complex filters, which are combinations of the individual filters that are available. For more information about filters, see [{% data variables.product.prodname_dependabot %} dashboard view filters](/code-security/security-overview/filtering-alerts-in-security-overview#dependabot-dashboard-view-filters).
* A custom repository role with the "View {% data variables.product.prodname_dependabot_alerts %}" fine-grained permissions for the repository. For more information, see [AUTOTITLE](/organizations/managing-user-access-to-your-organizations-repositories/managing-repository-roles/about-custom-repository-roles#security).
4
+
* Access to alerts for the repository. For more information, see [AUTOTITLE](/repositories/managing-your-repositorys-settings-and-features/enabling-features-for-your-repository/managing-security-and-analysis-settings-for-your-repository#granting-access-to-security-alerts).
0 commit comments