-
-
Notifications
You must be signed in to change notification settings - Fork 91
66 lines (57 loc) · 2.13 KB
/
security-defender-for-devops.yml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
# Microsoft Security DevOps (MSDO) is a command line application which integrates static analysis tools into the development cycle.
# MSDO installs, configures and runs the latest versions of static analysis tools
# (including, but not limited to, SDL/security and compliance tools).
#
# The Microsoft Security DevOps action is currently in beta and runs on the windows-latest queue,
# as well as Windows self hosted agents. ubuntu-latest support coming soon.
#
# For more information about the action , check out https://github.com/microsoft/security-devops-action
#
# Please note this workflow do not integrate your GitHub Org with Microsoft Defender For DevOps. You have to create an integration
# and provide permission before this can report data back to azure.
# Read the official documentation here : https://learn.microsoft.com/en-us/azure/defender-for-cloud/quickstart-onboard-github
name: Security - Microsoft Defender For Devops
on:
merge_group:
push:
branches:
- main
- dev
- release/*
- v2
pull_request:
branches:
- main
- dev
- release/*
- v2
schedule:
- cron: '34 12 * * 0'
permissions:
contents: read
security-events: read
jobs:
MSDO:
# currently only windows latest is supported
runs-on: windows-latest
permissions:
security-events: write
steps:
- name: Harden Runner
uses: step-security/[email protected]
with:
egress-policy: audit
# checks out the repository
- uses: actions/checkout@v4
- uses: actions/[email protected]
with:
dotnet-version: |
5.0.x
6.0.x
- name: Run Microsoft Security DevOps
uses: microsoft/[email protected]
id: msdo
- name: Upload results to Security tab
uses: github/codeql-action/[email protected]
with:
sarif_file: ${{ steps.msdo.outputs.sarifFile }}