StepSecurity Product Tour

Explore StepSecurity product features with an interactive experience

Categories

How Harden Runner detected the tj-actions supply chain attack

How Harden Runner detected the tj-actions supply chain attack

Harden Runner
Policy driven Pull Requests

Policy driven Pull Requests

Orchestrate Security
Harden Runner Detailed Demo

Harden Runner Detailed Demo

Harden Runner
Compromised Actions Policy

Compromised Actions Policy

Workflow Run Policies
How to Get Your GitHub Actions Security Score

How to Get Your GitHub Actions Security Score

Actions Governance
Prevent NPM Supply Chain Attacks with Harden-Runner

Prevent NPM Supply Chain Attacks with Harden-Runner

Harden Runner
StepSecurity Maintained Actions

StepSecurity Maintained Actions

Developer Experience
How Harden-Runner determines minimum GITHUB_TOKEN permissions

How Harden-Runner determines minimum GITHUB_TOKEN permissions

Harden Runner
Policy driven Pull Requests (Developers)

Policy driven Pull Requests (Developers)

Developer Experience
GitHub Checks (Harden Runner)

GitHub Checks (Harden Runner)

Developer Experience
Replace Third-Party Actions with StepSecurity Maintained Actions

Replace Third-Party Actions with StepSecurity Maintained Actions

Actions Governance
How to Setup Allowed Actions Policy

How to Setup Allowed Actions Policy

Workflow Run Policies
Workflow Run Policies

Workflow Run Policies

Developer Experience
Harden Runner analysis of compromised nx npm package

Harden Runner analysis of compromised nx npm package

Harden Runner
How to Request a StepSecurity Maintained Action

How to Request a StepSecurity Maintained Action

Actions Governance
Explore Secrets Exfiltration Policy

Explore Secrets Exfiltration Policy

Workflow Run Policies
How to Create Runner Label policy

How to Create Runner Label policy

Workflow Run Policies

There are no Product matching your criteria at this time.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.