The M365 Security & SharePoint Analysis Toolkit is actively maintained with regular security updates.
| Version | Supported | Notes |
|---|---|---|
| Latest (main) | ✅ | Active development with security updates |
| Feature branches | ✅ | Pre-release features under review |
All artifacts generated by GitHub Actions workflows are cryptographically signed using GitHub's build provenance attestation. This provides:
- Supply Chain Security: Verifiable proof that artifacts were built by GitHub Actions
- Integrity Verification: Cryptographic signatures prevent tampering
- Audit Trail: Complete provenance metadata for compliance requirements
To verify the provenance of an artifact:
# Install GitHub CLI if not already installed
# gh auth login
# Download and verify an artifact
gh attestation verify <artifact-path> --owner Heyson315 --repo share-reportAll security reports, audit results, and build artifacts include attestations automatically.
We take security seriously. If you discover a security vulnerability in the M365 Security Toolkit:
- DO NOT open a public GitHub issue for security vulnerabilities
- Email security concerns to: [security contact information]
- Include:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if available)
- Initial Response: Within 48 hours
- Status Updates: Every 5 business days
- Resolution Target: Critical issues within 7 days, others within 30 days
When using this toolkit:
- Credentials: Never commit secrets to the repository
- Service Principals: Use least-privilege permissions
- Audit Logs: Review workflow logs regularly
- Dependencies: Keep Python and PowerShell modules updated
- Attestations: Verify artifact provenance before deployment
- Automated Security Scanning: Bandit, Safety, and Semgrep
- Dependency Monitoring: Weekly automated updates
- PowerShell Script Analysis: PSScriptAnalyzer enforcement
- Build Provenance: Cryptographic artifact attestation
- Access Control: Role-based permissions for M365 services