Skip to content

Commit ced18f2

Browse files
Update Bicep best practices to reflect support for secure outputs using @secure()
1 parent d83e4c2 commit ced18f2

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

articles/azure-resource-manager/bicep/best-practices.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -105,7 +105,7 @@ For more information about Bicep variables, see [Variables in Bicep](variables.m
105105

106106
## Outputs
107107

108-
* Make sure you don't create outputs for sensitive data. Output values can be accessed by anyone who has access to the deployment history. They're not appropriate for handling secrets.
108+
* Make sure you don't create outputs for sensitive data unless they're marked as secure. Output values can be accessed by anyone who has access to the deployment history. To protect secrets, use the @secure() decorator (available in Bicep v0.35.1 and later) to prevent sensitive outputs from being logged or displayed.
109109

110110
* Instead of passing property values around through outputs, use the [existing keyword](existing-resource.md) to look up properties of resources that already exist. It's a best practice to look up keys from other resources in this way instead of passing them around through outputs. You'll always get the most up-to-date data.
111111

0 commit comments

Comments
 (0)