External Resources — Platform Engineering¶
Governance & Best Practices¶
| Resource | What it is |
|---|---|
| GitHub Well-Architected: Governance Policies Best Practices | GitHub's opinionated recommendations on governance policies — branch protection, required reviews, rulesets, org-level controls. Practical, not theoretical. |
| github-well-architected (source) | Full Well-Architected library source — reliability, security, operations, governance content. |
Key Takeaways from GitHub Well-Architected Governance¶
Branch Protection
- Require pull request reviews before merging (at least 1, ideally 2 for critical repos)
- Require status checks (CI must pass) before merge
- Require branches to be up to date before merging
- Restrict who can push to main/master directly
- Enable "Require signed commits" for regulated environments
Rulesets (GitHub's modern branch protection)
- Apply rules at org level, not per-repo (scales better)
- Target by branch pattern (main, release/*)
- Enforce across forks too
Code Owners
- Use CODEOWNERS file to auto-assign reviewers by directory/file type
- Combine with required reviews so the right team always reviews their area
Secrets & Security - Enable secret scanning on all repos - Enable push protection (blocks commits containing secrets) - Use Dependabot for dependency vulnerability alerts
Audit & Compliance - Audit log streaming — pipe GitHub audit logs to your SIEM - Required workflows — enforce org-wide CI checks even on repo-level overrides - Environment protection rules — require approvals for production deployments
Related Topics¶
- Security & Hardening
- CI/CD Pipelines — branch protection as part of deployment safety
- Terraform & IaC — governance as code