Network and runtime security monitoring should be enabled for GitHub-hosted runners
Last updated
Last updated
This feature is just for Enterprise users
This check passes if the step-security/harden-runner
GitHub Action is used in a job that runs on a GitHub-hosted runner.
Harden-Runner prevents the exfiltration of code and CI/CD credentials and detects file tampering during build.
Add the step-security/harden-runner GitHub Action to the job. You can fix this issue by an automated pull request.
Locate the compliance check titled “Network and runtime security monitoring should be enabled for GitHub-hosted runners.”
If this check has failed, click on it to view more details.
In the Remediation column, find the “Fix PR” button for the failed compliance check.
Click “Fix PR” to generate an automated fix.
After clicking “Fix PR,” StepSecurity will redirect you to the Secure Repo a suggested fix.
Click the “Create Pull Request” button to apply the changes.