Security News > 2023 > May > Microsoft, GitHub announce application security testing tools for Azure DevOps

GitHub has announced that its application security testing tools are now more widely available for subscribers of Microsoft's Azure DevOps Services.
"GitHub Advanced Security for Azure DevOps can not only help you find secrets that have already been exposed in Azure Repos, but also help you prevent new exposures by blocking any pushes to Azure Repos that contain secrets," says Aaron Hallberg, Director of Product for Azure DevOps, Microsoft.
The tool identifies the open-source packages used in Azure Repos and the vulnerabilities in them, and advises users on how to upgrade those packages to mitigate vulnerabilities.
Developers can now run CodeQL scans directly from Azure Pipelines on code from Azure Repos and act on the results within the Azure DevOps environment.
"Issues detected in each of these categories are presented in a repository-scoped Advanced Security experience using the Azure DevOps design language," Hallberg noted.
GitHub Advanced Security for Azure DevOps has been in private preview since November 2022 and is now in public preview.
News URL
https://www.helpnetsecurity.com/2023/05/24/application-security-testing-devops/
Related news
- GitHub CISO on security strategy and collaborating with the open-source community (source)
- Azure, Microsoft 365 MFA outage locks out users across regions (source)
- 3 Actively Exploited Zero-Day Flaws Patched in Microsoft's Latest Security Update (source)
- ‘Sneaky Log’ Microsoft Spoofing Scheme Sidesteps Two-Factor Security (source)
- Microsoft: Outdated Exchange servers fail to auto-mitigate security bugs (source)
- Microsoft: January Windows security updates break audio playback (source)
- Top 8 Penetration Testing Tools to Enhance Your Security (source)
- Microsoft Patches Critical Azure AI Face Service Vulnerability with CVSS 9.9 Score (source)
- Microsoft shares workaround for Windows security update issues (source)
- Microsoft names alleged credential-snatching 'Azure Abuse Enterprise' operators (source)