Skip to content

Commit f84ecfb

Browse files
Merge pull request #127216 from iheanacho-chukwu/update-secure-output-guidance
Update Bicep best practices to reflect support for secure outputs using @secure()
2 parents c014bb2 + ed91d66 commit f84ecfb

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

articles/azure-resource-manager/bicep/best-practices.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -105,7 +105,7 @@ For more information about Bicep variables, see [Variables in Bicep](variables.m
105105

106106
## Outputs
107107

108-
* Make sure you don't create outputs for sensitive data. Output values can be accessed by anyone who has access to the deployment history. They're not appropriate for handling secrets.
108+
* Mark sensitive data in outputs by using the [@secure() decorator](outputs.md#secure-outputs), which prevents sensitive outputs from being logged or displayed. Otherwise, output values can be accessed by anyone who has access to the deployment history.
109109

110110
* Instead of passing property values around through outputs, use the [existing keyword](existing-resource.md) to look up properties of resources that already exist. It's a best practice to look up keys from other resources in this way instead of passing them around through outputs. You'll always get the most up-to-date data.
111111

0 commit comments

Comments
 (0)