Skip to content

Commit 9d1d9a1

Browse files
Merge pull request #213896 from bmansheim/update-devops-rn-post-ignite
Update Defender for DevOps RN post-Ignite
2 parents 185980c + deef4f5 commit 9d1d9a1

File tree

1 file changed

+8
-4
lines changed

1 file changed

+8
-4
lines changed

articles/defender-for-cloud/release-notes.md

Lines changed: 8 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -62,11 +62,15 @@ Agentless vulnerability scanning is available in both Defender Defender Cloud Se
6262

6363
### Defender for DevOps (Preview)
6464

65-
Defender for Cloud now includes Defender for DevOps in preview.
65+
Microsoft Defender for Cloud enables comprehensive visibility, posture management, and threat protection across multicloud environments including Azure, AWS, Google, and on-premises resources.
6666

67-
You can now configure pull request annotations for secret scan findings in Azure DevOps.
67+
Now, the new Defender for DevOps service integrates source code management systems, like GitHub and Azure DevOps, into Defender for Cloud. With this new integration we are empowering security teams to protect their resources from code to cloud.
6868

69-
The Azure DevOps extension and GitHub action leverage the Microsoft Security DevOps tools to scan the following:
69+
Defender for DevOps allows you to gain visibility into and manage your connected developer environments and code resources. Currently, you can connect [Azure DevOps](quickstart-onboard-devops.md) and [GitHub](quickstart-onboard-github.md) systems to Defender for Cloud and onboard DevOps repositories to Inventory and the new DevOps Security page. It provides security teams with a high level overview of the discovered security issues that exist within them in a unified DevOps Security page.
70+
71+
Security Teams can configure pull request annotations to help Developers address secret scanning findings in Azure DevOps directly on their pull requests.
72+
73+
You can configure the Microsoft Security DevOps tools on Azure DevOps pipelines and GitHub workflows to enable the following security scans:
7074

7175
| Name | Language | License |
7276
|--|--|--|
@@ -78,7 +82,7 @@ The Azure DevOps extension and GitHub action leverage the Microsoft Security Dev
7882
| [Terrascan](https://github.com/tenable/terrascan) | Terraform (HCL2), Kubernetes (JSON/YAML), Helm v3, Kustomize, Dockerfiles, Cloud Formation | [Apache License 2.0](https://github.com/tenable/terrascan/blob/master/LICENSE) |
7983
| [Trivy](https://github.com/aquasecurity/trivy) | container images, file systems, git repositories | [Apache License 2.0](https://github.com/tenable/terrascan/blob/master/LICENSE) |
8084

81-
The following new recommendations are now available for DevOps Security:
85+
The following new recommendations are now available for DevOps Security assessments:
8286

8387
| Recommendation | Description | Severity |
8488
|--|--|--|

0 commit comments

Comments
 (0)