Developer reviewing source code and security alerts on a screen
GitHub Advanced Security

GitHub Advanced Security licensing. Per committer, not per seat.

A buyer side guide to GitHub Advanced Security licensing in 2026. How the per committer metric works, what the 2025 SKU split changed, and the scope lever that controls the bill.

Contact Us Microsoft Practice
500+Enterprise clients
$2B+Under advisory
Industry Recognized
500+ Enterprise Clients
$2B+ Under Advisory
11 Vendor Practices
100% Buyer Side Independent

GitHub Advanced Security is a paid add on to GitHub Enterprise, billed per committer for the cloud product and per active committer for the server product. The metric counts who pushes code, not who reads it, which is why the bill rarely matches your developer headcount.

Key takeaways

  • GitHub Advanced Security is licensed per committer, not per seat or per repository.
  • A committer is any unique user who pushed code to a GHAS enabled repository in the last 90 days.
  • The 2025 SKU split divides GHAS into Code Security and Secret Protection, sold separately.
  • List pricing sits near 30 dollars per committer per month for each of the two new SKUs.
  • Active committer counts drift upward as contractors and bots push code, inflating the bill.
  • You can scope GHAS to specific repositories, which is the main cost control lever.

This guide is for engineering and procurement leaders sizing a GitHub Advanced Security purchase in 2026. Read it with the GitHub Enterprise licensing guide and the Microsoft security licensing guide.

How is GitHub Advanced Security licensed in 2026?

GHAS is an add on. You buy it on top of GitHub Enterprise, and it is metered by the committer, the unique user who pushes code to a repository where GHAS is switched on.

Microsoft owns GitHub and documents the model on the GitHub Advanced Security billing page. The metric is the same idea across cloud and server, with a different counting window for each.

What counts as a committer for GHAS billing?

A committer is any account that has pushed a commit to a GHAS enabled repository. The window matters, because that is what turns a one time contributor into a billable line.

  • Cloud: a committer is active if they pushed in the last 90 days.
  • Server: the count is based on committers across all GHAS enabled repositories.
  • Bots and service accounts: automation that pushes code can also be counted.

What changed with the 2025 SKU split?

GitHub broke the single GHAS product into two SKUs. You can now buy them apart, which helps teams that only need one half.

  • Code Security: code scanning, CodeQL, and dependency review.
  • Secret Protection: secret scanning and push protection.
  • Both: needed for the full original GHAS feature set.

How much does GitHub Advanced Security cost?

List pricing runs near 30 dollars per committer per month for each new SKU. The total depends on how many of your committers touch GHAS enabled repositories, not on your seat count.

GitHub Advanced Security indicative list pricing, 2026

SKU Metric Indicative list What it covers
Code SecurityPer committer per month30 dollarsCode scanning, CodeQL, dependency review
Secret ProtectionPer committer per month30 dollarsSecret scanning, push protection
Both SKUsPer committer per month60 dollarsFull original GHAS feature set
Bundled in GHEIncludedNo extraBase GitHub Enterprise only, no GHAS

Why does the GHAS bill grow faster than your team?

The active committer count picks up contractors, short term contributors, and automation. Each one that pushes to a GHAS enabled repository adds to the metered total.

What is the main cost control lever?

Scope. You decide which repositories have GHAS switched on. Enabling it organization wide is the most common reason a quote comes back far higher than expected.

GHAS is not priced by who can see the code. It is priced by who pushes it. Control the repository scope and you control the bill, not the other way around.

What to do next

  1. Pull the active committer count from your GitHub billing page before you ask for a quote.
  2. Separate the repositories that genuinely need scanning from the ones that do not.
  3. Decide whether you need Code Security, Secret Protection, or both.
  4. Model the bill on active committers, not total seats or developer headcount.
  5. Identify bot and service accounts that push code and may be counted.
  6. Negotiate the committer rate inside the wider GitHub and Microsoft agreement.
  7. Set a quarterly review of which repositories have GHAS enabled.

Frequently asked questions

How is GitHub Advanced Security licensed?

GHAS is licensed per committer as an add on to GitHub Enterprise. A committer is any unique user who pushed code to a repository where GHAS is enabled, so the bill tracks active contributors rather than total seats or readers.

What is a committer for GHAS billing?

A committer is an account that pushed a commit to a GHAS enabled repository. On GitHub cloud the count uses a rolling 90 day window, so a developer who stops pushing eventually drops out of the billable total.

How much does GHAS cost in 2026?

List pricing is near 30 dollars per committer per month for each of the two SKUs, Code Security and Secret Protection. Buying both brings the list rate to roughly 60 dollars per committer per month before any negotiated discount.

What is the difference between Code Security and Secret Protection?

Code Security covers code scanning, CodeQL, and dependency review. Secret Protection covers secret scanning and push protection. GitHub split the old single GHAS product into these two SKUs so teams can buy only the half they need.

Can I limit GHAS to specific repositories?

Yes. GHAS is enabled per repository, which is the main cost control lever. Turning it on organization wide counts every active committer across every repository, which is why broad enablement drives the largest quotes.

Do bots and service accounts count as committers?

They can. Automation that pushes code to a GHAS enabled repository may be counted as an active committer. Review your service accounts before sizing, because pipeline identities are a common and avoidable source of bill inflation.

Microsoft EA Renewal Playbook

The full microsoft ea renewal playbook framework from the Microsoft Practice.

Microsoft renewal moves, the EA framework, the M365 SKU framework, the Copilot framework, and the buyer side moves across the full Microsoft estate.

Used across more than five hundred enterprise engagements. Independent. Buyer side. Built for procurement leaders running the next renewal cycle.

No spam. We will only email you about this download. Privacy.
Run the Microsoft 365 license optimizer against your estate in under five minutes.
Open the Tool →
$30
Per committer per month list
90
Day active window, cloud
2
SKUs after the split
100%
Buyer Side

Teams buy GHAS on seat count, then get billed on active committers. The gap is the contractors and bots pushing to repositories nobody scoped. Fix the scope first.

Morten Andersen
Co Founder. Ex IBM, ex Oracle.
Deep Library

More on this topic.

Microsoft Practice →
Laptop showing a code repository
Microsoft
GitHub Enterprise Licensing
How GitHub Enterprise seats, Cloud, and Server licensing work for buyers.
11 min read
Security operations dashboard on a monitor
Microsoft
Microsoft Security Licensing
The Microsoft security stack, what is bundled, and what is a paid add on.
12 min read
Engineer working on cybersecurity tooling
Microsoft
Defender for Endpoint P1 vs P2
The feature gap and licensing split between the two Defender for Endpoint plans.
10 min read
Editorial boardroom interior

The advisor your vendors do not want.

500+ enterprise clients. 11 vendor practices. Industry recognized. One conversation can change what you pay for the next three years.

Microsoft brief. Once a week.

One short note on Microsoft licensing moves, EA and CSP mechanics, M365 and Azure SKU traps, and the buyer side levers we run in client engagements. No noise.