Skip to content

Commit fa8a28e

Browse files
Merge pull request #271270 from charlesoxyer/patch-35
Update azure-devops-extension.md
2 parents 55dcb1f + 53e4769 commit fa8a28e

File tree

1 file changed

+17
-1
lines changed

1 file changed

+17
-1
lines changed

articles/defender-for-cloud/azure-devops-extension.md

Lines changed: 17 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -112,7 +112,7 @@ If you don't have access to install the extension, you must request access from
112112
```
113113

114114
> [!NOTE]
115-
> The artifactName 'CodeAnalysisLogs' is required for integration with Defender for Cloud. For additional tool configuration options, see [the Microsoft Security DevOps wiki](https://github.com/microsoft/security-devops-action/wiki)
115+
> The artifactName 'CodeAnalysisLogs' is required for integration with Defender for Cloud. For additional tool configuration options and environment variables, see [the Microsoft Security DevOps wiki](https://github.com/microsoft/security-devops-action/wiki)
116116

117117
1. To commit the pipeline, select **Save and run**.
118118

@@ -121,6 +121,22 @@ The pipeline will run for a few minutes and save the results.
121121
> [!NOTE]
122122
> Install the SARIF SAST Scans Tab extension on the Azure DevOps organization in order to ensure that the generated analysis results will be displayed automatically under the Scans tab.
123123

124+
## Uploading findings from third-party security tooling into Defender for Cloud
125+
126+
While Defender for Cloud provides the MSDO CLI for standardized functionality and poliy controls across a set of open source security analyzers, you have the flexibility to upload results from other third-party security tooling that you may have configured in CI/CD pipelines to Defender for Cloud for comprehensive code-to-cloud contextualization. All results uploaded to Defender for Cloud must be in standard SARIF format.
127+
128+
First, ensure your Azure DevOps repositories are [onboarded to Defender for Cloud](quickstart-onboard-devops.md). After successfully onboarding, Defender for Cloud continuously monitors the 'CodeAnalysisLogs' artifact for SARIF output.
129+
130+
You can use the 'PublishBuildArtifacts@1' task to ensure SARIF output is published to the correct artifact. For example, if a security analyzer outputs 'results.sarif', you can configure the following task in your job to ensure results are uploaded to Defender for Cloud:
131+
132+
```yml
133+
- task: PublishBuildArtifacts@1
134+
inputs:
135+
PathtoPublish: 'results.sarif'
136+
ArtifactName: 'CodeAnalysisLogs'
137+
```
138+
Findings from third-party security tools will appear as 'Azure DevOps repositories should have code scanning findings resolved' assessments associated with the repository the secuirty finding was identified in.
139+
124140
## Learn more
125141

126142
- Learn how to [create your first pipeline](/azure/devops/pipelines/create-first-pipeline).

0 commit comments

Comments
 (0)