Page tree

Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Expand
titlePolicy Rulesets (Enterprise & Org Level)
Panel
titlePolicy Rulesets (Enterprise & Org Level)
Info

We enforce "Policy as Code" to prevent accidental exposure:




Enterprise Level: Branch protection is mandatory 

Org Level:

  • Branch Rules
    • Prevent branch deletion
    • Block force pushes
    • Require 2 pull request approvals
    • Require last push approval
    • Require review thread resolution
    • Bypass: Organization Admins (for PRs only)
  • Push Rules
    • Restrict changes to .github/**/* directory
    • Max file path length: 25 characters
    • Block .bin and .exe files
    • Max file size: 4MB
    • Bypass: Organization Admins (always)
  • Tag Rules
    • Prevent tag deletion
    • Block force pushes to tags
    • Enforce semantic versioning pattern (e.g., 1.2.3, 2.0.0-beta.1)






Expand
titleIntegrating ORCA & Shift-Left Security
Panel
titleIntegrating ORCA & Shift-Left Security


ORCA Integration: Add the orca-scan action to your .github/workflows/main.yml. It will scan your container images and IaC templates before deployment.
Shift-Left Pipeline: Use the Security Tab in GHE to view CodeQL and Dependabot alerts. Vulnerabilities rated "High" or "Critical" will automatically fail the build in the Staging environment.

We avoid "Org Sprawl." New Organizations are only created for distinct Business Units or large-scale Projects.

Naming Convention (Org): SQO-<business-unit> (e.g., SQO-INFRASTRUCTURE,  SQO-INTEGRATION , SQO-SYENSQOAI).

Naming Convention (Repo):  Syensqo-[platform]-[app name/project name]   
 

  • platform:   (Azure), (GCP), (AWS), (Multi-cloud), (on-prem).

  • Example: Syensqo-Azure-infra-Subscription-Mgmt