Skip to main content

Internal Monitoring

GitGuardian's Analytics feature offers robust data visualization and actionable insights, empowering you to monitor your security posture, track performance trends, and make informed decisions.

The Internal Monitoring Analytics feature is organized to provide clarity and depth across key security dimensions.

  • Protect: Focuses on repository monitoring and secret detection effectiveness, providing metrics on source coverage, blocked pull requests, and the prevalence of secrets in commits.
  • Detect: Offers insights into where and how secrets are detected, highlighting incident creation, most detected secret types, and sources or teams most frequently involved in secret leaks.
  • Remediate: Tracks the status and progress of incident remediation, including open and closed incidents, automation efficiency, team and source performance, and response times.
  • Prevent: Measures the effectiveness and adoption of GGShield for preventing secret leaks in real time, including incidents avoided, scan activity, and developer engagement.

Protect

Analytics in the Protect section provide visibility into repository monitoring, secret detection effectiveness, the prevalence of secrets in commits, and overall scanning activity. These metrics help teams track security posture, identify gaps, and ensure compliance with secret management best practices.

1. Count of Sources

Purpose: Displays the percentage of monitored sources over time, helping identify whether all sources are properly monitored and highlighting discrepancies between total sources and those eligible for historical scanning.

2. Count of Sources by Category

Purpose: Shows the percentage of monitored sources by category (e.g., code repositories), providing insight into which source types are monitored and identifying any under-monitored categories.

3. Percentage of Blocked GitHub PRs

Purpose: Illustrates the percentage of GitHub pull requests blocked from merging due to detected secrets, indicating the effectiveness of secret detection in preventing sensitive data leaks via PRs.

4. GitHub PRs with Check Runs

Purpose: Shows the total number of GitHub PRs scanned by GitGuardian, tracking coverage and integration of secret scanning in the PR workflow.

5. Percentage of Commits Containing Secrets

Purpose: Displays the percentage of commits containing secrets out of the total commits scanned, helping assess the prevalence of hardcoded secrets in the codebase over time.

6. Commits Scanned**

Purpose: Shows the total number of commits scanned for secrets, regardless of whether secrets were found, indicating overall scanning activity and coverage.

Detect

These analytics help you understand where and how secrets are being detected in your organization, which types of secrets are most problematic, and which sources and teams are most frequently involved. This enables targeted remediation, improved training, and more effective secret management policies.

1. New incidents created

Purpose: Shows the number of newly created incidents over time, categorized by severity (Critical, High, Medium, Low, Info, Unknown). Helps prioritize remediation efforts by visualizing when and how many incidents of each severity occur.

2. Most detected secrets

Purpose: Displays the most frequently detected secret types (e.g., generic high entropy secrets, passwords, API keys, credentials). Useful for identifying which kinds of secrets are most commonly leaked and may require targeted prevention or education.

3. Top sources by incident count

Purpose: Lists the sources (repositories, directories, etc.) responsible for the most incidents, broken down by severity. Helps pinpoint where secret leaks are originating, so you can focus remediation and exclusion efforts on problematic sources.

4. Top teams by incident count

Purpose: Shows which teams are responsible for the most incidents, broken down by severity. Useful for identifying teams that may need additional training, support, or process improvements to reduce secret leaks.

Remediate

These analytics provide visibility into the status and progress of incident remediation, the effectiveness of automation, team and source performance, and response times. They help organizations track backlog, prioritize efforts, and continuously improve their secret management and incident response workflows.

1. Average open incidents per source (code repositories only)

Purpose: Tracks the average number of unresolved incidents per code repository over time. Helps monitor whether remediation efforts are keeping pace with incident creation and highlights trends in backlog.

2. Open incidents

Purpose: Shows the total number of incidents that are currently unresolved and require attention, categorized by severity (Critical, High, Medium, Low, Info, Unknown). Useful for understanding the current workload and prioritizing remediation.

3. Closed incidents

Purpose: Displays the total number of incidents that have been resolved and closed over time, broken down by severity. Indicates remediation progress and effectiveness.

4. Auto-closed by GitGuardian automations

Purpose: Shows incidents that were automatically closed by system automations, categorized by validity (Invalid, Failed to check, No checker). Highlights the efficiency and impact of automated remediation.

5. Top teams by closed incidents

Purpose: Lists teams that closed the most incidents during the selected period, broken down by validity. Helps identify high-performing teams and distribute workload insights.

6. Top sources by closed incidents

Purpose: Identifies sources (repositories, directories, etc.) with the most incidents closed during the selected period. Useful for prioritizing remediation efforts and understanding which sources are being effectively managed.

7. Median time to remediate

Purpose: Displays the median time taken to resolve incidents each month. Helps monitor changes in response times, identify trends, and pinpoint areas for improvement in remediation processes.

Prevent

These analytics provide insight into the effectiveness and adoption of GGShield for preventing secret leaks in real time, the number of incidents avoided, usage patterns of secret scanning, and developer engagement. This helps organizations measure the impact of preventive controls and drive continuous improvement in secret management practices.

1. New incidents found in realtime

Purpose: Shows the number of new incidents detected in real time, categorized by severity (Critical, High, Medium, Low, Info, Unknown). Helps monitor immediate risk and the effectiveness of real-time secret detection.

2. Total count of incidents avoided by GGShield

Purpose: Tracks the number of incidents prevented by GGShield scans (e.g., pre-commit, path, pre-push, etc.), demonstrating the tool’s effectiveness in stopping hardcoded secrets before they become security incidents.

3. GGShield scans over time

Purpose: Shows the total number of GGShield CLI scans executed during the selected period, broken down by scan mode (e.g., pre-commit, path, pre-push, etc.). Indicates adoption, usage patterns, and coverage of secret scanning across workflows.

4. Active GGShield users

Purpose: Displays the number of unique developers actively using GGShield, counted by Personal Access Token usage in the last 30 days. Helps track engagement and adoption of secret prevention tools among developers.

Analytics Tools

Group by: Months, periods

Breakdown: By category, source, or other dimensions

Export: Download analytics data for reporting

- Display Options: Show values or percentages

Filter by team