Skip to content

Commit f191eed

Browse files
committed
update to catch up with main
1 parent ec6e9be commit f191eed

File tree

1 file changed

+40
-4
lines changed

1 file changed

+40
-4
lines changed

articles/defender-for-cloud/azure-devops-extension.yml

Lines changed: 40 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -117,16 +117,52 @@ procedureSection:
117117
118118
```
119119
120-
> [!NOTE]
121-
> The artifactName 'CodeAnalysisLogs' is required for integration with Defender for Cloud. For additional tool configuration options, see [the Microsoft Security DevOps wiki](https://github.com/microsoft/security-devops-action/wiki)
120+
> [!NOTE]
121+
> The artifactName 'CodeAnalysisLogs' is required for integration with
122+
> Defender for Cloud. For additional tool configuration options and environment variables, see
123+
> [the Microsoft Security DevOps wiki](https://github.com/microsoft/security-devops-action/wiki)
124+
122125
- |
123126
To commit the pipeline, select **Save and run**.
124127
125128
The pipeline will run for a few minutes and save the results.
126129
127130
> [!NOTE]
128-
> Install the SARIF SAST Scans Tab extension on the Azure DevOps organization in order to ensure that the generated analysis results will be displayed automatically under the Scans tab.
131+
> Install the SARIF SAST Scans Tab extension on the Azure DevOps
132+
> organization in order to ensure that the generated analysis results
133+
> will be displayed automatically under the Scans tab.
129134
135+
- title: |
136+
Uploading findings from third-party security tooling into Defender for Cloud
137+
summary: |
138+
While Defender for Cloud provides the MSDO CLI for standardized
139+
functionality and policy controls across a set of open source security
140+
analyzers, you have the flexibility to upload results from other
141+
third-party security tooling that you may have configured in CI/CD
142+
pipelines to Defender for Cloud for comprehensive code-to-cloud
143+
contextualization. All results uploaded to Defender for Cloud must be in
144+
standard SARIF format.
145+
146+
First, ensure your Azure DevOps repositories are
147+
[onboarded to Defender for Cloud](quickstart-onboard-devops.md). After
148+
you successfully onboard Defender for Cloud, it continuously monitors the
149+
'CodeAnalysisLogs' artifact for SARIF output.
150+
151+
You can use the 'PublishBuildArtifacts@1' task to ensure SARIF output is
152+
published to the correct artifact. For example, if a security analyzer
153+
outputs 'results.sarif', you can configure the following task in your job
154+
to ensure results are uploaded to Defender for Cloud:
155+
code: |
156+
```yml
157+
- task: PublishBuildArtifacts@1
158+
inputs:
159+
PathtoPublish: 'results.sarif'
160+
ArtifactName: 'CodeAnalysisLogs'
161+
```
162+
163+
Findings from third-party security tools will appear as 'Azure DevOps
164+
repositories should have code scanning findings resolved' assessments
165+
associated with the repository the secuirty finding was identified in.
130166
131167
relatedContent:
132168
- text: Create your first pipeline
@@ -138,4 +174,4 @@ relatedContent:
138174

139175

140176
# Learn more about [DevOps Security in Defender for Cloud](defender-for-devops-introduction.md).
141-
#Learn how to [connect your Azure DevOps Organizations](quickstart-onboard-devops.md) to Defender for Cloud.
177+
# Learn how to [connect your Azure DevOps Organizations](quickstart-onboard-devops.md) to Defender for Cloud.

0 commit comments

Comments
 (0)