You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/azure-devops-extension.yml
+40-4Lines changed: 40 additions & 4 deletions
Original file line number
Diff line number
Diff line change
@@ -117,16 +117,52 @@ procedureSection:
117
117
118
118
```
119
119
120
-
> [!NOTE]
121
-
> The artifactName 'CodeAnalysisLogs' is required for integration with Defender for Cloud. For additional tool configuration options, see [the Microsoft Security DevOps wiki](https://github.com/microsoft/security-devops-action/wiki)
120
+
> [!NOTE]
121
+
> The artifactName 'CodeAnalysisLogs' is required for integration with
122
+
> Defender for Cloud. For additional tool configuration options and environment variables, see
123
+
> [the Microsoft Security DevOps wiki](https://github.com/microsoft/security-devops-action/wiki)
124
+
122
125
- |
123
126
To commit the pipeline, select **Save and run**.
124
127
125
128
The pipeline will run for a few minutes and save the results.
126
129
127
130
> [!NOTE]
128
-
> Install the SARIF SAST Scans Tab extension on the Azure DevOps organization in order to ensure that the generated analysis results will be displayed automatically under the Scans tab.
131
+
> Install the SARIF SAST Scans Tab extension on the Azure DevOps
132
+
> organization in order to ensure that the generated analysis results
133
+
> will be displayed automatically under the Scans tab.
129
134
135
+
- title: |
136
+
Uploading findings from third-party security tooling into Defender for Cloud
137
+
summary: |
138
+
While Defender for Cloud provides the MSDO CLI for standardized
139
+
functionality and policy controls across a set of open source security
140
+
analyzers, you have the flexibility to upload results from other
141
+
third-party security tooling that you may have configured in CI/CD
142
+
pipelines to Defender for Cloud for comprehensive code-to-cloud
143
+
contextualization. All results uploaded to Defender for Cloud must be in
144
+
standard SARIF format.
145
+
146
+
First, ensure your Azure DevOps repositories are
147
+
[onboarded to Defender for Cloud](quickstart-onboard-devops.md). After
148
+
you successfully onboard Defender for Cloud, it continuously monitors the
149
+
'CodeAnalysisLogs' artifact for SARIF output.
150
+
151
+
You can use the 'PublishBuildArtifacts@1' task to ensure SARIF output is
152
+
published to the correct artifact. For example, if a security analyzer
153
+
outputs 'results.sarif', you can configure the following task in your job
154
+
to ensure results are uploaded to Defender for Cloud:
155
+
code: |
156
+
```yml
157
+
- task: PublishBuildArtifacts@1
158
+
inputs:
159
+
PathtoPublish: 'results.sarif'
160
+
ArtifactName: 'CodeAnalysisLogs'
161
+
```
162
+
163
+
Findings from third-party security tools will appear as 'Azure DevOps
164
+
repositories should have code scanning findings resolved' assessments
165
+
associated with the repository the secuirty finding was identified in.
130
166
131
167
relatedContent:
132
168
- text: Create your first pipeline
@@ -138,4 +174,4 @@ relatedContent:
138
174
139
175
140
176
# Learn more about [DevOps Security in Defender for Cloud](defender-for-devops-introduction.md).
141
-
#Learn how to [connect your Azure DevOps Organizations](quickstart-onboard-devops.md) to Defender for Cloud.
177
+
#Learn how to [connect your Azure DevOps Organizations](quickstart-onboard-devops.md) to Defender for Cloud.
0 commit comments