Skip to content

Commit d165da3

Browse files
authored
Merge pull request #274707 from charlesoxyer/patch-37
Update azure-devops-extension.yml with new tool integration
2 parents 332e11d + 026481a commit d165da3

File tree

1 file changed

+8
-8
lines changed

1 file changed

+8
-8
lines changed

articles/defender-for-cloud/azure-devops-extension.yml

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -19,8 +19,9 @@ introduction: |
1919
| [AntiMalware](https://www.microsoft.com/windows/comprehensive-security) | AntiMalware protection in Windows from Microsoft Defender for Endpoint, that scans for malware and breaks the build if malware has been found. This tool scans by default on windows-latest agent. | Not Open Source |
2020
| [Bandit](https://github.com/PyCQA/bandit) | Python | [Apache License 2.0](https://github.com/PyCQA/bandit/blob/master/LICENSE) |
2121
| [BinSkim](https://github.com/Microsoft/binskim) | Binary--Windows, ELF | [MIT License](https://github.com/microsoft/binskim/blob/main/LICENSE) |
22+
| [Checkov](https://github.com/bridgecrewio/checkov) | Terraform, Terraform plan, CloudFormation, AWS SAM, Kubernetes, Helm charts, Kustomize, Dockerfile, Serverless, Bicep, OpenAPI, ARM | [Apache License 2.0](https://github.com/bridgecrewio/checkov/blob/main/LICENSE) |
2223
| [ESlint](https://github.com/eslint/eslint) | JavaScript | [MIT License](https://github.com/eslint/eslint/blob/main/LICENSE) |
23-
| [IaCFileScanner](iac-template-mapping.md) | Terraform, CloudFormation, ARM Template, Bicep | Not Open Source |
24+
| [IaCFileScanner](iac-template-mapping.md) | Template mapping tool for Terraform, CloudFormation, ARM Template, Bicep | Not Open Source |
2425
| [Template Analyzer](https://github.com/Azure/template-analyzer) | ARM Template, Bicep | [MIT License](https://github.com/Azure/template-analyzer/blob/main/LICENSE.txt) |
2526
| [Terrascan](https://github.com/accurics/terrascan) | Terraform (HCL2), Kubernetes (JSON/YAML), Helm v3, Kustomize, Dockerfiles, CloudFormation | [Apache License 2.0](https://github.com/accurics/terrascan/blob/master/LICENSE) |
2627
| [Trivy](https://github.com/aquasecurity/trivy) | container images, Infrastructure as Code (IaC) | [Apache License 2.0](https://github.com/aquasecurity/trivy/blob/main/LICENSE) |
@@ -105,22 +106,21 @@ procedureSection:
105106
- task: MicrosoftSecurityDevOps@1
106107
displayName: 'Microsoft Security DevOps'
107108
# inputs:
108-
# command: 'run' | 'pre-job' | 'post-job'. Optional. The command to run. Default: run
109-
# config: string. Optional. A file path to an MSDO configuration file ('*.gdnconfig').
110-
# policy: 'azuredevops' | 'microsoft' | 'none'. Optional. The name of a well-known Microsoft policy. If no configuration file or list of tools is provided, the policy may instruct MSDO which tools to run. Default: azuredevops.
109+
# config: string. Optional. A file path to an MSDO configuration file ('*.gdnconfig'). Vist the MSDO GitHub wiki linked below for additional configuration instructions
110+
# policy: 'azuredevops' | 'microsoft' | 'none'. Optional. The name of a well-known Microsoft policy to determine the tools/checks to run. If no configuration file or list of tools is provided, the policy may instruct MSDO which tools to run. Default: azuredevops.
111111
# categories: string. Optional. A comma-separated list of analyzer categories to run. Values: 'code', 'artifacts', 'IaC', 'containers'. Example: 'IaC, containers'. Defaults to all.
112112
# languages: string. Optional. A comma-separated list of languages to analyze. Example: 'javascript,typescript'. Defaults to all.
113-
# tools: string. Optional. A comma-separated list of analyzer tools to run. Values: 'bandit', 'binskim', 'eslint', 'templateanalyzer', 'terrascan', 'trivy'.
114-
# break: boolean. Optional. If true, will fail this build step if any error level results are found. Default: false.
113+
# tools: string. Optional. A comma-separated list of analyzer tools to run. Values: 'bandit', 'binskim', 'checkov', 'eslint', 'templateanalyzer', 'terrascan', 'trivy'.
114+
# break: boolean. Optional. If true, will fail this build step if any high severity level results are found. Default: false.
115115
# publish: boolean. Optional. If true, will publish the output SARIF results file to the chosen pipeline artifact. Default: true.
116116
# artifactName: string. Optional. The name of the pipeline artifact to publish the SARIF result file to. Default: CodeAnalysisLogs*.
117117
118118
```
119119
120120
> [!NOTE]
121121
> The artifactName 'CodeAnalysisLogs' is required for integration with
122-
> Defender for Cloud. For additional tool configuration options and environment variables, see
123-
> [the Microsoft Security DevOps wiki](https://github.com/microsoft/security-devops-action/wiki)
122+
> Defender for Cloud. **For additional tool configuration options and environment variables, see
123+
> [the Microsoft Security DevOps wiki](https://github.com/microsoft/security-devops-action/wiki)**
124124
125125
- |
126126
To commit the pipeline, select **Save and run**.

0 commit comments

Comments
 (0)