Skip to content

Commit ed91d66

Browse files
Update articles/azure-resource-manager/bicep/best-practices.md
Co-authored-by: John Downs <[email protected]>
1 parent ced18f2 commit ed91d66

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

articles/azure-resource-manager/bicep/best-practices.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -105,7 +105,7 @@ For more information about Bicep variables, see [Variables in Bicep](variables.m
105105

106106
## Outputs
107107

108-
* Make sure you don't create outputs for sensitive data unless they're marked as secure. Output values can be accessed by anyone who has access to the deployment history. To protect secrets, use the @secure() decorator (available in Bicep v0.35.1 and later) to prevent sensitive outputs from being logged or displayed.
108+
* Mark sensitive data in outputs by using the [@secure() decorator](outputs.md#secure-outputs), which prevents sensitive outputs from being logged or displayed. Otherwise, output values can be accessed by anyone who has access to the deployment history.
109109

110110
* Instead of passing property values around through outputs, use the [existing keyword](existing-resource.md) to look up properties of resources that already exist. It's a best practice to look up keys from other resources in this way instead of passing them around through outputs. You'll always get the most up-to-date data.
111111

0 commit comments

Comments
 (0)