{"id":7990,"date":"2025-09-12T10:41:46","date_gmt":"2025-09-12T10:41:46","guid":{"rendered":"https:\/\/techhub.saworks.io\/?post_type=docs&#038;p=7990"},"modified":"2025-09-24T12:02:34","modified_gmt":"2025-09-24T12:02:34","slug":"resume","status":"publish","type":"docs","link":"https:\/\/techhub.saworks.io\/fr\/docs\/tutoriel-github-intermediaire\/securite-avancee-de-github-partie-1-sur-2\/resume\/","title":{"rendered":"R\u00e9sum\u00e9"},"content":{"rendered":"\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\">\n<p><strong>GitHub Advanced Security (GHAS)<\/strong> est une suite puissante d\u2019outils et de fonctionnalit\u00e9s qui vous permet d\u2019identifier les vuln\u00e9rabilit\u00e9s de s\u00e9curit\u00e9 dans votre base de code et votre environnement. Ces fonctionnalit\u00e9s vous permettent de s\u00e9curiser votre code \u00e0 <strong>chaque \u00e9tape du cycle de d\u00e9veloppement logiciel<\/strong>, et pas seulement en production.<\/p>\n\n\n\n<p>Gr\u00e2ce \u00e0 GHAS, vous pouvez :<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Anticiper les menaces et les violations de s\u00e9curit\u00e9,<\/li>\n\n\n\n<li>Tirer parti de l\u2019expertise de la communaut\u00e9 s\u00e9curit\u00e9,<\/li>\n\n\n\n<li>Continuer \u00e0 utiliser des logiciels open source en toute s\u00e9curit\u00e9,<\/li>\n\n\n\n<li>Mettre en \u0153uvre des <strong>bonnes pratiques de s\u00e9curit\u00e9<\/strong> pour instaurer une culture orient\u00e9e s\u00e9curit\u00e9 au sein de votre organisation.<\/li>\n<\/ul>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">Dans ce module, vous avez appris \u00e0 :<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>D\u00e9finir ce qu\u2019est GHAS et comprendre l\u2019importance de ses fonctionnalit\u00e9s cl\u00e9s comme <strong>l\u2019analyse de secrets<\/strong>, <strong>l\u2019analyse de code<\/strong> et <strong>Dependabot<\/strong>.<\/li>\n\n\n\n<li>Utiliser GHAS pour <strong>maximiser l\u2019impact en mati\u00e8re de s\u00e9curit\u00e9<\/strong>.<\/li>\n\n\n\n<li>Comprendre le r\u00f4le de GHAS dans <strong>l\u2019\u00e9cosyst\u00e8me de s\u00e9curit\u00e9<\/strong>.<\/li>\n\n\n\n<li>Explorer le fonctionnement du <strong>graphe de d\u00e9pendances<\/strong> et son lien avec les fonctionnalit\u00e9s de Dependabot.<\/li>\n\n\n\n<li>D\u00e9couvrir <strong>Push Protection<\/strong> et comment elle emp\u00eache de mani\u00e8re proactive l\u2019exposition de secrets pendant le d\u00e9veloppement.<\/li>\n\n\n\n<li>Reconna\u00eetre que GitHub propose d\u00e9sormais ces fonctionnalit\u00e9s de s\u00e9curit\u00e9 sous <strong>deux offres produits<\/strong> :\n<ul class=\"wp-block-list\">\n<li><strong>GitHub Secret Protection<\/strong><\/li>\n\n\n\n<li><strong>GitHub Code Security<\/strong><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">\ud83d\udcda Pour aller plus loin<\/h3>\n\n\n\n<p>Voici quelques ressources pour approfondir vos connaissances sur GitHub Advanced Security :<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong><a href=\"https:\/\/github.com\/orgs\/community\/discussions\/137197\">Pr\u00e9paration \u00e0 l\u2019examen de certification GitHub Advanced Security<\/a><\/strong><\/li>\n\n\n\n<li><strong><a href=\"https:\/\/docs.github.com\/en\/code-security\/security-overview\/about-security-overview\">Vue d\u2019ensemble de la s\u00e9curit\u00e9 GitHub<\/a><\/strong><\/li>\n\n\n\n<li><strong><a href=\"https:\/\/docs.github.com\/en\/rest\/dependabot?apiVersion=2022-11-28\">Dependabot<\/a><\/strong><\/li>\n\n\n\n<li><strong><a href=\"https:\/\/docs.github.com\/en\/code-security\/code-scanning\">Analyse de code (Code scanning)<\/a><\/strong><\/li>\n\n\n\n<li><strong><a href=\"https:\/\/docs.github.com\/en\/code-security\/secret-scanning\">Analyse de secrets (Secret scanning)<\/a><\/strong><\/li>\n\n\n\n<li><strong><a href=\"https:\/\/docs.github.com\/en\/code-security\/code-scanning\/introduction-to-code-scanning\/about-code-scanning-with-codeql#about-code-scanning-with-codeql\">CodeQL<\/a><\/strong><\/li>\n\n\n\n<li><strong><a href=\"https:\/\/docs.github.com\/en\/code-security\/code-scanning\/integrating-with-code-scanning\">Int\u00e9gration avec l\u2019analyse de code<\/a><\/strong><\/li>\n<\/ul>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>GitHub Advanced Security (GHAS) est une suite puissante d\u2019outils et de fonctionnalit\u00e9s qui vous permet d\u2019identifier les vuln\u00e9rabilit\u00e9s de s\u00e9curit\u00e9 dans votre base [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":7959,"menu_order":56,"template":"","doc_tag":[],"doc_badge":[],"class_list":["post-7990","docs","type-docs","status-publish","hentry"],"author_avatar":"https:\/\/secure.gravatar.com\/avatar\/6a70e7c73db9f245e650948d09d74f61?s=96&d=mm&r=g","author_name":"Annick N'dri","_links":{"self":[{"href":"https:\/\/techhub.saworks.io\/fr\/wp-json\/wp\/v2\/docs\/7990"}],"collection":[{"href":"https:\/\/techhub.saworks.io\/fr\/wp-json\/wp\/v2\/docs"}],"about":[{"href":"https:\/\/techhub.saworks.io\/fr\/wp-json\/wp\/v2\/types\/docs"}],"author":[{"embeddable":true,"href":"https:\/\/techhub.saworks.io\/fr\/wp-json\/wp\/v2\/users\/2"}],"version-history":[{"count":0,"href":"https:\/\/techhub.saworks.io\/fr\/wp-json\/wp\/v2\/docs\/7990\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/techhub.saworks.io\/fr\/wp-json\/wp\/v2\/docs\/7959"}],"wp:attachment":[{"href":"https:\/\/techhub.saworks.io\/fr\/wp-json\/wp\/v2\/media?parent=7990"}],"wp:term":[{"taxonomy":"doc_tag","embeddable":true,"href":"https:\/\/techhub.saworks.io\/fr\/wp-json\/wp\/v2\/doc_tag?post=7990"},{"taxonomy":"doc_badge","embeddable":true,"href":"https:\/\/techhub.saworks.io\/fr\/wp-json\/wp\/v2\/doc_badge?post=7990"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}