Skip to content

Commit c31a331

Browse files
author
build docs workflow
committed
update docs
1 parent ae505f9 commit c31a331

File tree

2 files changed

+6
-6
lines changed

2 files changed

+6
-6
lines changed

docs/github/repository/repository_has_too_many_admins.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,18 +1,18 @@
11
---
22
layout: default
3-
title: Repository Should Have Fewer Than Three Admins
3+
title: Repository Should Have A Low Admin Count
44
parent: Repository Policies
55
grand_parent: GitHub Policies
66
---
77

88

9-
## Repository Should Have Fewer Than Three Admins
9+
## Repository Should Have A Low Admin Count
1010
policy name: repository_has_too_many_admins
1111

1212
severity: LOW
1313

1414
### Description
15-
Repository admins are highly privileged and could create great damage if they are compromised. It is recommended to limit the number of Repository Admins to the minimum required (recommended maximum 3 admins).
15+
Repository admins are highly privileged and could create great damage if they are compromised. It is recommended to limit the number of repository admins to the minimum required, and no more than 5% of the userbase (Up to 3 admins are always allowed).
1616

1717
### Threat Example(s)
1818
A compromised user with admin permissions can initiate a supply chain attack in a plethora of ways.

docs/gitlab/project/project_has_too_many_admins.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,18 +1,18 @@
11
---
22
layout: default
3-
title: Project Should Have Fewer Than Three Owners
3+
title: Project Should Have A Low Owner Count
44
parent: Project Policies
55
grand_parent: GitLab Policies
66
---
77

88

9-
## Project Should Have Fewer Than Three Owners
9+
## Project Should Have A Low Owner Count
1010
policy name: project_has_too_many_admins
1111

1212
severity: LOW
1313

1414
### Description
15-
Projects owners are highly privileged and could create great damage if they are compromised. It is recommended to limit the number of Project Owners to the minimum required (recommended maximum 3 admins).
15+
Projects owners are highly privileged and could create great damage if they are compromised. It is recommended to limit the number of Project Owners to the minimum required, and no more than 5% of the userbase (Up to 3 owners are always allowed).
1616

1717
### Threat Example(s)
1818
A compromised user with owner permissions can initiate a supply chain attack in a plethora of ways.

0 commit comments

Comments
 (0)