1
0
mirror of synced 2025-12-21 10:57:10 -05:00
Files
docs/content/github/authenticating-to-github/preventing-unauthorized-access.md
Jason Etcovitch caaee7a124 Update all files to use {% data %} (#15253)
* Add back changes from prior to purge

* Manually fix some invalid Liquid

* Updoot render-content

* Improve test messages to show correct output

* Run el scripto

* Pass the remaining test
2020-09-29 16:01:04 -04:00

2.1 KiB

title, intro, redirect_from, versions
title intro redirect_from versions
Preventing unauthorized access You may be alerted to a security incident in the media, such as the discovery of the [Heartbleed bug](http://heartbleed.com/), or your computer could be stolen while you're signed in to {% data variables.product.product_location %}. In such cases, changing your password prevents any unintended future access to your account and projects.
/articles/preventing-unauthorized-access
free-pro-team enterprise-server
* *

{% data variables.product.product_name %} requires a password to perform sensitive actions, such as adding new SSH keys, authorizing applications, or modifying team members.

After changing your password, you should perform these actions to make sure that your account is secure:

  • Enable two-factor authentication on your account so that access requires more than just a password.
  • Review your SSH keys, deploy keys, and authorized integrations and revoke unauthorized or unfamiliar access in your SSH and Applications settings. {% if currentVersion == "free-pro-team@latest" %}
  • Verify all your email addresses. If an attacker added their email address to your account, it could allow them to force an unintended password reset. {% endif %}
  • Review your account's security log. This provides an overview on various configurations made to your repositories. For example, you can ensure that no private repositories were turned public, or that no repositories were transferred.
  • Review the webhooks on your repositories. Webhooks could allow an attacker to intercept pushes made to your repository.
  • Make sure that no new deploy keys were created. This could enable outside servers access to your projects.
  • Review recent commits made to your repositories.
  • Review the list of collaborators for each repository.