Skip to content

Commit c22e9bf

Browse files
sarahsfelicitymay
andauthored
Add link to Resources article in Secret Risk Assessment docs (#55293)
Co-authored-by: Felicity Chapman <[email protected]>
1 parent 1c146fe commit c22e9bf

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

content/code-security/securing-your-organization/understanding-your-organizations-exposure-to-leaked-secrets/about-secret-risk-assessment.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ topics:
1919

2020
Assessing your exposure to leaked secrets is crucial if you want to prevent:
2121

22-
* **Exploitation by bad actors**. Malicious actors can use leaked secrets such as API keys, passwords, and tokens to gain unauthorized access to systems, databases, and sensitive information. If secrets are leaked, it can lead to data breaches, compromising user data and potentially causing significant financial and reputational damage.
22+
* **Exploitation by bad actors**. Malicious actors can use leaked secrets such as API keys, passwords, and tokens to gain unauthorized access to systems, databases, and sensitive information. Leaked secrets can lead to data breaches, compromising user data and potentially causing significant financial and reputational damage. See industry examples and in-depth discussion in [Understanding your organization's exposure to secret leaks](https://resources.github.com/enterprise/understanding-secret-leak-exposure) in {% data variables.product.github %} Executive Insights.
2323

2424
* **Regulatory problems**. Many industries have strict regulatory requirements for data protection, and leaked secrets can result in non-compliance with regulations, leading to legal penalties and fines.
2525

0 commit comments

Comments
 (0)