Skip to main content

6 posts tagged with "public-monitoring"

View All Tags

Playbooks extended to Public Monitoring

calendar icon   Release Date: November 7, 2025

Playbooks for Public Monitoring

Playbooks are now available for public secret incidents, bringing unified automation workflows across your entire security perimeter. This enhancement extends GitGuardian's proven automation capabilities to the Public Monitoring product.

What's new?

You can now automate remediation workflows for public secret incidents. All playbooks (except auto-share public link) now support Public Monitoring, reducing manual work when managing public incidents. The "auto-ignore false positive incidents" is activated by default on the public secret incidents, while the others have to be activated based on your desired workflows.

Why is this important?

Public monitoring can generate high volumes of incidents that require manual review and closure. With playbooks now available for public incidents, you can automatically resolve cases where secrets have been revoked, ignore invalid secrets, filter out false positives, and grant access to involved developers—significantly reducing the manual workload for your security team when managing public incidents.

Get Started Today!

Learn more about configuring playbooks in our documentation, or visit the Playbooks setting page directly.

Enhancements

  • Incident list: Added direct link to source location from the incident list view.
  • API: The change_type field for secret occurrences is now exposed via API.

Fixes

  • Microsoft Teams integration: Fixed an issue which prevented to update the Client secret of a Microsoft Teams notifier integration.
  • Incident feedback: Fixed a bug where the "Gives access to sensitive data" answer would always be registered as false when posting a feedback on internal incident.

Graph Enhancement and HasMySecretLeaked Integration

calendar icon   Release Date: October 28, 2025

Expanded NHI graph

We're excited to announce a major enhancement to GitGuardian's visualization capabilities: the improved identity graph with enhanced publicly leaked detection. This transforms how you investigate and understand secret incidents across your entire security perimeter.

What does this mean for you?

Comprehensive Context at a Glance: Our enhanced graph interface now consolidates scattered visualizations into one unified, context-rich view. You'll see critical details like severity levels, source information, and occurrence data directly within the graph, eliminating the need to switch between multiple pages during incident investigation.

Advanced Public Leak Intelligence: Building on our HasMySecretLeaked capabilities, the platform now provides enhanced visibility into three distinct types of public exposure—secrets in monitored public sources, incidents in your public perimeter, and external GitHub locations—all clearly categorized and contextualized within your incident workflows.

Why is this important?

Modern security teams need to understand the full scope of secret exposure across both private and public domains. With secrets often appearing in multiple locations—from internal repositories to external GitHub commits—having a unified view that correlates these incidents is crucial for effective remediation and risk assessment.

Enhanced Public Monitoring Integration

The new "Publicly Leaked" tag unifies previously scattered exposure indicators, providing clear visibility when secrets appear across your monitored sources, public incidents, or external locations discovered through our HasMySecretLeaked database. This integration ensures you have complete visibility into your organization's secret exposure landscape.

Get Started Today!

The enhanced graph views are now available across Internal Monitoring, Public Monitoring, and NHI Governance modules. Navigate to any incident to experience the new unified visualization that brings together comprehensive context, public leak detection, and streamlined investigation workflows in one powerful interface.

Enhancements

  • Incidents: Enhanced display capabilities to show large occurrence patches that previously showed "Diff too long to render".
  • Explore (Public Monitoring): Added history tracking for Explore searches and scans.

Enhanced Slack Notifications - Public Monitoring, Internal Monitoring & Honeytoken Alerts

calendar icon   Release Date: October 25, 2025

Enhanced Slack Notifications

We're excited to announce a major enhancement to our Slack integration that brings comprehensive notification coverage for all incident lifecycle events, honeytoken alerts, and public monitoring incidents. This unified notification framework provides complete visibility into your security posture directly in Slack.

What's new?

Complete Incident Lifecycle Coverage: Previously, Slack notifications only covered new incident detections and regression. Now you can receive notifications for every critical event including resolution, assignment, status changes, comments, access control, and sharing - giving you complete visibility into incident management workflows.

Public Monitoring Support: Public monitoring incidents can be sent directly to Slack channels, enabling teams to receive perimeter security alerts alongside internal monitoring alerts.

Honeytoken Alerting: Slack notifications now support honeytoken events, providing immediate alerts for honeytoken activity, previously only available via custom webhooks and email.

Flexible Configuration: Enhanced Slack webhook configuration allows teams to subscribe to specific event types per channel, providing granular control over notification preferences.

Why is this important?

Security teams need real-time visibility into all security events to respond quickly and effectively. This enhancement addresses key customer feedback about missing notification updates for incident resolution and status changes, while extending Slack integration to public monitoring and honeytoken.

Get Started Today!

This enhancement is automatically available for all workspaces. Existing Slack integrations will maintain their current notification settings, while new configurations can be set up with expanded event coverage.

Learn more about Slack integration configuration | Configure honeytoken alerts

Enhancements

  • GitGuardian Bridge: Extended support for GitGuardian Bridge to SaaS EU. Learn more about GG Bridge.
  • Public API: Enabled editing of Custom Monitored Perimeter via Public API for all sources (except for custom sources).
  • GitLab Integration: Improved performance of the GitLab source selection interface to prevent browser unresponsiveness when searching through large numbers of namespaces, groups, and repositories.

Fixes

  • Perimeter: Fixed an issue where the scan button was not visible for members who are not in the all incidents team.
  • SSO: Fixed an issue preventing IDP configuration creation due to missing default SCIM team permissions.
  • Sources:
    • Fixed tooltip displaying "unknown error" for failed scans when the actual reason was branch deletion.
    • Resolved JFrog Container Registry health check failure when the first registry contains no repositories.
  • Incidents:
    • Fixed an issue where occurrences displayed incorrect commit and file information, ensuring accurate incident tracking data.
    • Fixed an issue where the "Requires code fixing" section failed to load in some condition.

“Explore” and find more company-related secrets!

calendar icon   Release Date: September 26, 2025

Explore Thumbnail

Public Monitoring's new Explore feature enables you to proactively discover secrets related to your organization that may have been leaked beyond your defined perimeter. This powerful enhancement helps you find exposures in public GitHub repositories that the perimeter-based monitoring might miss.

Explore is available exclusively for Public Monitoring customers. Contact us for availability and pricing information.

How it works:

  • Company-focused search: Use targeted queries to find commits containing your domains, service names, or internal system references
  • Secret detection: Scan search results using GitGuardian's detection engine
  • Incident creation: Convert discovered secrets into public secret incidents
  • Automated monitoring: Schedule searches for your organizational assets with automatic incident creation

Why it matters: Your secrets can leak outside your direct control - in personal repositories, contractor projects, or third-party integrations. Explore helps you discover these organizational exposures by searching for your company's specific digital footprint: domains, email patterns, service names, and infrastructure references.

Get started today: Public Monitoring customers can navigate to Public Monitoring > Explore and use the built-in search tailored for organizational security monitoring.

Learn more on Explore.


Enhancements

  • Public Monitoring perimeter: Added CSV export functionality to download the list of developers.
  • Secret detail: Base64 Basic Authentication token incidents now show the decoded username and password in the secret information.
  • New Ignore reason: Added "Invalid Secret" as a reason when ignoring incidents where the secret was already invalid at detection time and requires no remediation.

Public Monitoring API endpoints now available

calendar icon   Release Date: August 1, 2025

Incident Playbook Thumbnail

For customers with Public Monitoring enabled, we're excited to announce the release of dedicated API endpoints, enabling programmatic access to manage Public Monitoring findings.

What's new?

We've introduced new endpoints that allow you to:

  • Manage and interact with public secret incidents
  • List public perimeter developers information The new endpoints maintain consistency with our internal incidents API structure, ensuring a familiar experience for existing API users.

Why does this matter?

With these new API endpoints, you can:

  • Integrate GitGuardian's public monitoring capabilities directly into your existing security tools
  • Create automated workflows to handle incidents more efficiently
  • Reduce response time by eliminating manual platform interactions

Check our API documentation to get started.


Fixes

  • Incident permissions: Fixed an issue where assignees with "can view" permissions would be hidden from the incident's UI.
  • Slack integration: Fixed an issue where duplicate secret occurrences were created when thread replies were posted to channels in Slack.
  • JFrog Artifactory integration:
    • Fixed an error in repository last update date retrieval during recurrent scans.
    • Improved error handling and diagnostics for health check connectivity issues.

Extend your security coverage with Public Monitoring

calendar icon   Release Date: July 25, 2025

Public Monitoring Thumbnail

We're excited to announce the integration of Public Monitoring directly into the GitGuardian platform, bringing all your security modules under one unified, powerful experience. This consolidation streamlines workflows and creates powerful synergies for comprehensive secrets and NHI security.

Public Monitoring continuously scans public GitHub to detect exposed secrets related to your organization and developers. This proactive monitoring helps you identify and remediate security risks before they can be exploited by malicious actors, extending your security coverage beyond your direct control.

The solution offers:

  • Proactive risk detection: Identify exposed secrets as early as possible by scanning your defined public perimeter
  • Contextual intelligence: Understand the scope and severity of each incident with detailed investigation context
  • Unified incident management: Leverage the same powerful incident management capabilities across both public and internal monitoring
  • Enhanced cross-module insights: Benefit from integrated correlation with Internal Monitoring and NHI Governance, including exploration maps that show how publicly exposed secrets relate to your internal incidents, vaulted secrets or infrastructure usage

Public Monitoring is a module that requires a specific license. Contact us for availability and pricing information.

Migration timeline

This integrated Public Monitoring experience is available for new users starting today. If you're currently using our standalone Public Monitoring application, you'll continue to have full access to your existing service while we prepare your seamless migration to the unified platform. We'll reach out directly to coordinate your transition and ensure you can take advantage of these powerful new capabilities.

Learn more:


Enhancements

  • Custom webhooks: Enhanced webhook configuration with more granular event selection and support for Public Monitoring incident events (available to teams with Public Monitoring access). See the updated documentation.