Configure the Microsoft Security DevOps GitHub action
Microsoft Security DevOps is a command line application that integrates static analysis tools into the development lifecycle. Security DevOps installs, configures, and runs the latest versions of static analysis tools such as, SDL, security and compliance tools. Security DevOps is data-driven with portable configurations that enable deterministic execution across multiple environments.
Security DevOps uses the following Open Source tools:
Name | Language | License |
---|---|---|
AntiMalware | AntiMalware protection in Windows from Windows Defender, that scans source code and breaks the run if malware has been found | Not Open Source |
Bandit | Python | Apache License 2.0 |
BinSkim | Binary--Windows, ELF | MIT License |
ESlint | JavaScript | MIT License |
Template Analyzer | ARM template, Bicep file | MIT License |
Terrascan | Terraform (HCL2), Kubernetes (JSON/YAML), Helm v3, Kustomize, Dockerfiles, Cloud Formation | Apache License 2.0 |
Trivy | container images, file systems, git repositories | Apache License 2.0 |
Prerequisites
An Azure subscription If you don’t have an Azure subscription, create a free account before you begin.
Follow the guidance to set up GitHub Advanced Security.
Open the Microsoft Security DevOps GitHub action in a new window.
Configure the Microsoft Security DevOps GitHub action
To setup GitHub action:
Sign in to GitHub.
Select a repository you want to configure the GitHub action to.
Select Actions.
Select New workflow.
On the Get started with GitHub Actions page, select set up a workflow yourself
In the text box, enter a name for your workflow file. For example,
msdevopssec.yml
.Copy and paste the following sample action workflow into the Edit new file tab.
name: MSDO windows-latest on: push: branches: [ main ] pull_request: branches: [ main ] workflow_dispatch: jobs: sample: # MSDO runs on windows-latest and ubuntu-latest. # macos-latest supporting coming soon runs-on: windows-latest steps: - uses: actions/checkout@v3 - uses: actions/setup-dotnet@v3 with: dotnet-version: | 5.0.x 6.0.x # Run analyzers - name: Run Microsoft Security DevOps Analysis uses: microsoft/security-devops-action@preview id: msdo # Upload alerts to the Security tab - name: Upload alerts to Security tab uses: github/codeql-action/upload-sarif@v2 with: sarif_file: ${{ steps.msdo.outputs.sarifFile }}
For details on various input options, see action.yml
Select Start commit
Select Commit new file.
The process can take up to one minute to complete.
Select Actions and verify the new action is running.
View Scan Results
To view your scan results:
Sign in to GitHub.
Navigate to Security > Code scanning alerts > Tool.
From the dropdown menu, select Filter by tool.
Code scanning findings will be filtered by specific MSDO tools in GitHub. These code scanning results are also pulled into Defender for Cloud recommendations.
Learn more
Learn about GitHub actions for Azure.
Learn how to deploy apps from GitHub to Azure.
Next steps
Learn more about Defender for DevOps.
Learn how to connect your GitHub to Defender for Cloud.
Feedback
Submit and view feedback for