Kickstart collaborative DevSecOps practices with GitHub and Azure

Published May 25 2021 08:00 AM 18.9K Views
Microsoft

Kickstart collaborative DevSecOps practices with GitHub and Azure

 

Companies on the forefront of digital transformation have seen DevOps provide software engineers and operations teams with a faster and more efficient way to develop code. Unfortunately, while DevOps practices have enabled faster, more efficient development cycles, they’ve also uncovered a new bottleneck—security. While many organizations have opted to push security to the end of application development and management, this can be very costly. NIST estimated the cost of fixing a security defect in production can be up to 60 times more expensive than during the development cycle. Conversely, Digital leaders recognize the importance of shifting security left and tackling vulnerabilities as soon as they arise. These leaders are integrating security into delivery pipelines, leveraging modern platform capabilities and fostering collaboration between the development and security teams in the latest evolution of the DevOps methodology, DevSecOps. Embracing DevSecOps is a software delivery advantage! By uncovering vulnerabilities earlier, your team can save time remediating issues and realizing compliancy, while also minimizing any associated costs.

 

So how can your organization begin their DevSecOps adoption journey?

 

It starts with incorporating security into the early stages of the development lifecycle (shift left) along with providing end-to-end observability to facilitate collaboration between the development and security teams. At last year’s Ignite, we discussed ways to shift left by adding security scans to container images created as part of Continuous Integration (CI) workflow. This helps developers scan for common vulnerabilities in their container images before pushing to a container registry. Securing Container images is one great way of shifting security left, but organizations also need to give visibility into delivery pipelines and registry scans to their security teams.

 

At Microsoft Build 2021, we are excited to announce the public preview of Azure Security Center (ASC) integration with GitHub Actions. The new capabilities are our first steps towards building shared tooling and experience by extending the reporting from container scans into Azure Security Center—providing security teams better insight and understanding as to the source of vulnerable container images and the workflows and repositories they come from.

 

Provide DevSecOps teams observability into GitHub Action workflows

With this tighter integration we are allowing DevSecOps teams to run vulnerability scans, resolve findings, and visualize the security posture of workflows within their CI/CD pipeline.

 

CI/CD vulnerability scanning of container images helps shift security left by offering increased visibility and control and by providing CI/CD scan assessments to Azure Security Center (ASC). Now, your security teams can access a holistic, 360-degree view across CI/CD pipelines and runtime resources through CI/CD scan assessments in ASC. DevSecOps teams will now receive greater, shared insight into development practices and potentially vulnerable code, containers, and infrastructure.

 

samitjhaveri_0-1621124575237.png

 

Going forward, any workflow that pushes a container image without a scan action present will alert the user with an ASC recommendation. Each ASC recommendation details the affected resources along with a proposed remediation path and steps to help each path achieve a “healthy” state. Below are details on how to enable the new capabilities across GitHub and Azure to get you started with your DevSecOps journey.

 

How to setup Azure Security Center for GitHub integration

You can easily onboard this feature by navigating to Settings->Integrations in Azure Security Center

 

samitjhaveri_1-1621124575266.png

 

After clicking on Configure CI/CD integration, select the Microsoft Managed Application Insights account pertaining your region of choice.

 

samitjhaveri_2-1621124575294.png

 

 

To enable CI/CD Scanning in GitHub, start by adding the connection string and authentication token to publish the CI/CD scan results back to your Microsoft Managed Application Insights account.

samitjhaveri_3-1621124575361.png

 

Now it’s time to harvest insights into container image vulnerabilities. After you’ve enabled CI/CD scanning for images built and published from GitHub workflows, ASC showcases any vulnerabilities found in those images. Of course, it’s important to form a holistic picture of your data, and you can use these CI/CD scan results along with registry scan results to trace the lifecycle of the image from CI/CD to registry.

samitjhaveri_4-1621124575373.png

 

 

It’s important to think of this expanded scanning capability as the conduit to foster collaboration among your developer and SecOps teams. CI/CD vulnerability scanning gives much needed visibility into container images and the GitHub workflows that are pushing these images. You can also help developers scan their container images for common vulnerabilities—eliminating issues before deploying to a container registry, a containerized web app, or a Kubernetes cluster.

 

Start collaborating with GitHub and Azure

This feature is currently in Public Preview so please use non-production workflows while using this feature. This feature is available only in Public Cloud. You will need to use the feature flag as shown to use the feature in Azure Portal (https://ms.portal.azure.com/?feature.cicd=true#blade/Microsoft_Azure_Security/SecurityMenuBlade/5/0/)This feature flag will be removed in a few days.

 

To learn more about container security check out documentation and visit the GitHub and Azure page to find the full list of GitHub and Azure integrations. Don’t forget to check out the 6 tips for integrating security into your DevOps practices whitepaper to explore even more ways to kickstart your DevSecOps journey.

 

For any questions regarding the public preview please send an email to azseccontainerred@microsoft.com

7 Comments
Senior Member

Hi, is possible to have the same approach to Azure DevOps?

Visitor

I'm also curious about the Azure DevOps, or is Microsoft not going to support on this?

Visitor

Does this work for Azure Azure DevOps 

Occasional Visitor

DevSecOps helps improve software consistency, shorten time to market, increase productivity, and improve governance. Thanks for sharing.

Microsoft

We plan to support this capability in Azure DevOps when we go GA.

Visitor

@samit_jhaveri Is there any timeline, where I can follow up on this?

Occasional Visitor

May I know the roadmap for DevOps pipelines and Github actions ? Whether we have to focus on DevOps pipelines or Github Actions ?

 

Thank you,

Siva

%3CLINGO-SUB%20id%3D%22lingo-sub-2385072%22%20slang%3D%22en-US%22%3ERe%3A%20Kickstart%20collaborative%20DevSecOps%20practices%20with%20GitHub%20and%20Azure%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2385072%22%20slang%3D%22en-US%22%3E%3CP%3EI%20am%20Muhammad%20Imran%20from%20Pakistan%20and%20need%20website%20as%20the%20name%20of%20aazantraders%20also%20work%20account%20because%20i%20am%20registered%20as%20a%20taxpayer%20from%20over%20government%20so%20i%20need%20website%20first%20because%20i%20cannot%20create%20website%20and%20also%20work%20account%20for%20payment%20method%20i%20need%20your%20help%26nbsp%3B%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2386344%22%20slang%3D%22en-US%22%3ERe%3A%20Kickstart%20collaborative%20DevSecOps%20practices%20with%20GitHub%20and%20Azure%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2386344%22%20slang%3D%22en-US%22%3E%3CP%3EHi%2C%20is%20possible%20to%20have%20the%20same%20approach%20to%20Azure%20DevOps%3F%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2388628%22%20slang%3D%22en-US%22%3ERe%3A%20Kickstart%20collaborative%20DevSecOps%20practices%20with%20GitHub%20and%20Azure%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2388628%22%20slang%3D%22en-US%22%3E%3CP%3EI'm%20also%20curious%20about%20the%20Azure%20DevOps%2C%20or%20is%20Microsoft%20not%20going%20to%20support%20on%20this%3F%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2391318%22%20slang%3D%22en-US%22%3ERe%3A%20Kickstart%20collaborative%20DevSecOps%20practices%20with%20GitHub%20and%20Azure%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2391318%22%20slang%3D%22en-US%22%3E%3CP%3EWe%20plan%20to%20support%20this%20capability%20in%20Azure%20DevOps%20when%20we%20go%20GA.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2393431%22%20slang%3D%22en-US%22%3ERe%3A%20Kickstart%20collaborative%20DevSecOps%20practices%20with%20GitHub%20and%20Azure%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2393431%22%20slang%3D%22en-US%22%3E%3CP%3EMay%20I%20know%20the%20roadmap%20for%20DevOps%20pipelines%20and%20Github%20actions%20%3F%20Whether%20we%20have%20to%20focus%20on%20DevOps%20pipelines%20or%20Github%20Actions%20%3F%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EThank%20you%2C%3C%2FP%3E%3CP%3ESiva%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2388809%22%20slang%3D%22en-US%22%3ERe%3A%20Kickstart%20collaborative%20DevSecOps%20practices%20with%20GitHub%20and%20Azure%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2388809%22%20slang%3D%22en-US%22%3E%3CP%3EDoes%20this%20work%20for%20Azure%20Azure%20DevOps%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2390507%22%20slang%3D%22en-US%22%3ERe%3A%20Kickstart%20collaborative%20DevSecOps%20practices%20with%20GitHub%20and%20Azure%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2390507%22%20slang%3D%22en-US%22%3E%3CP%3E%3CSPAN%3EDevSecOps%20helps%20improve%20software%20consistency%2C%20shorten%20time%20to%20market%2C%20increase%20productivity%2C%20and%20improve%20governance.%3C%2FSPAN%3E%3CSPAN%20class%3D%22Apple-converted-space%22%3E%26nbsp%3BThanks%20for%20sharing.%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2393324%22%20slang%3D%22en-US%22%3ERe%3A%20Kickstart%20collaborative%20DevSecOps%20practices%20with%20GitHub%20and%20Azure%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2393324%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F334187%22%20target%3D%22_blank%22%3E%40samit_jhaveri%3C%2FA%3E%26nbsp%3BIs%20there%20any%20timeline%2C%20where%20I%20can%20follow%20up%20on%20this%3F%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2357730%22%20slang%3D%22en-US%22%3EKickstart%20collaborative%20DevSecOps%20practices%20with%20GitHub%20and%20Azure%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2357730%22%20slang%3D%22en-US%22%3EKickstart%20collaborative%20DevSecOps%20practices%20with%20GitHub%20and%20Azure%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3ECompanies%20on%20the%20forefront%20of%20digital%20transformation%20have%20seen%20DevOps%20provide%20software%20engineers%20and%20operations%20teams%20with%20a%20faster%20and%20more%20efficient%20way%20to%20develop%20code.%20Unfortunately%2C%20while%20DevOps%20practices%20have%20enabled%20faster%2C%20more%20efficient%20development%20cycles%2C%20they%E2%80%99ve%20also%20uncovered%20a%20new%20bottleneck%E2%80%94security.%20While%20many%20organizations%20have%20opted%20to%20push%20security%20to%20the%20end%20of%20application%20development%20and%20management%2C%20this%20can%20be%20very%20costly.%20%3CA%20href%3D%22https%3A%2F%2Fsecurityboulevard.com%2F2020%2F09%2Fthe-importance-of-fixing-and-finding-vulnerabilities-in-development%2F%23%3A~%3Atext%3DAccording%2520to%2520the%2520NIST%2520(the%2Cthat%2520should%2520concern%2520most%2520organizations%22%20rel%3D%22nofollow%20noopener%20noreferrer%22%20target%3D%22_blank%22%3ENIST%3C%2FA%3E%20estimated%20the%20cost%20of%20fixing%20a%20security%20defect%20in%20production%20can%20be%20up%20to%2060%20times%20more%20expensive%20than%20during%20the%20development%20cycle.%20Conversely%2C%20Digital%20leaders%20recognize%20the%20importance%20of%20shifting%20security%20left%20and%20tackling%20vulnerabilities%20as%20soon%20as%20they%20arise.%20These%20leaders%20are%20integrating%20security%20into%20delivery%20pipelines%2C%20leveraging%20modern%20platform%20capabilities%20and%20fostering%20collaboration%20between%20the%20development%20and%20security%20teams%20in%20the%20latest%20evolution%20of%20the%20DevOps%20methodology%2C%20DevSecOps.%20Embracing%20DevSecOps%20is%20a%20software%20delivery%20advantage!%20By%20uncovering%20vulnerabilities%20earlier%2C%20your%20team%20can%20save%20time%20remediating%20issues%20and%20realizing%20compliancy%2C%20while%20also%20minimizing%20any%20associated%20costs.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3ESo%20how%20can%20your%20organization%20begin%20their%20DevSecOps%20adoption%20journey%3F%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EIt%20starts%20with%20incorporating%20security%20into%20the%20early%20stages%20of%20the%20development%20lifecycle%20(shift%20left)%20along%20with%20providing%20end-to-end%20observability%20to%20facilitate%20collaboration%20between%20the%20development%20and%20security%20teams.%20At%20last%20year%E2%80%99s%20Ignite%2C%20we%20discussed%20ways%20to%20shift%20left%20by%20%3CA%20href%3D%22https%3A%2F%2Fazure.microsoft.com%2Fen-us%2Fblog%2Fenabling-resilient-devops-practices-with-code-to-cloud-automation%2F%22%20rel%3D%22noopener%20noreferrer%22%20target%3D%22_blank%22%3Eadding%20security%20scans%20to%20container%20images%3C%2FA%3E%20created%20as%20part%20of%20Continuous%20Integration%20(CI)%20workflow.%20This%20helps%20developers%20scan%20for%20common%20vulnerabilities%20in%20their%20container%20images%20before%20pushing%20to%20a%20container%20registry.%20Securing%20Container%20images%20is%20one%20great%20way%20of%20shifting%20security%20left%2C%20but%20organizations%20also%20need%20to%20give%20visibility%20into%20delivery%20pipelines%20and%20registry%20scans%20to%20their%20security%20teams.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EAt%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Faka.ms%2FBuild2021-BRK214%22%20rel%3D%22noopener%20noreferrer%22%20target%3D%22_blank%22%3EMicrosoft%20Build%202021%3C%2FA%3E%2C%20we%20are%20excited%20to%20announce%20the%20public%20preview%20of%20%3CA%20href%3D%22https%3A%2F%2Fazure.microsoft.com%2Fen-us%2Fservices%2Fsecurity-center%2F%22%20rel%3D%22noopener%20noreferrer%22%20target%3D%22_blank%22%3EAzure%20Security%20Center%3C%2FA%3E%20(ASC)%20integration%20with%20GitHub%20Actions.%20The%20new%20capabilities%20are%20our%20first%20steps%20towards%20building%20shared%20tooling%20and%20experience%20by%20extending%20the%20reporting%20from%20container%20scans%20into%20Azure%20Security%20Center%E2%80%94providing%20security%20teams%20better%20insight%20and%20understanding%20as%20to%20the%20source%20of%20vulnerable%20container%20images%20and%20the%20workflows%20and%20repositories%20they%20come%20from.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3EProvide%20DevSecOps%20teams%20observability%20into%20GitHub%20Action%20workflows%3CP%3EWith%20this%20tighter%20integration%20we%20are%20allowing%20DevSecOps%20teams%20to%20run%20vulnerability%20scans%2C%20resolve%20findings%2C%20and%20visualize%20the%20security%20posture%20of%20workflows%20within%20their%20CI%2FCD%20pipeline.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3ECI%2FCD%20vulnerability%20scanning%20of%20container%20images%20helps%20shift%20security%20left%20by%20offering%20increased%20visibility%20and%20control%20and%20by%20providing%20CI%2FCD%20scan%20assessments%20to%20Azure%20Security%20Center%20(ASC).%20Now%2C%20your%20security%20teams%20can%20access%20a%20holistic%2C%20360-degree%20view%20across%20CI%2FCD%20pipelines%20and%20runtime%20resources%20through%20CI%2FCD%20scan%20assessments%20in%20ASC.%20DevSecOps%20teams%20will%20now%20receive%20greater%2C%20shared%20insight%20into%20development%20practices%20and%20potentially%20vulnerable%20code%2C%20containers%2C%20and%20infrastructure.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EGoing%20forward%2C%20any%20workflow%20that%20pushes%20a%20container%20image%20without%20a%20scan%20action%20present%20will%20alert%20the%20user%20with%20an%20ASC%20recommendation.%20Each%20ASC%20recommendation%20details%20the%20affected%20resources%20along%20with%20a%20proposed%20remediation%20path%20and%20steps%20to%20help%20each%20path%20achieve%20a%20%E2%80%9Chealthy%E2%80%9D%20state.%20Below%20are%20details%20on%20how%20to%20enable%20the%20new%20capabilities%20across%20GitHub%20and%20Azure%20to%20get%20you%20started%20with%20your%20DevSecOps%20journey.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3EHow%20to%20setup%20Azure%20Security%20Center%20for%20GitHub%20integration%3CP%3EYou%20can%20easily%20onboard%20this%20feature%20by%20navigating%20to%20Settings-%26gt%3BIntegrations%20in%20Azure%20Security%20Center%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EAfter%20clicking%20on%20Configure%20CI%2FCD%20integration%2C%20select%20the%20Microsoft%20Managed%20Application%20Insights%20account%20pertaining%20your%20region%20of%20choice.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3ETo%20enable%20CI%2FCD%20Scanning%20in%20GitHub%2C%20start%20by%20adding%20the%20connection%20string%20and%20authentication%20token%20to%20publish%20the%20CI%2FCD%20scan%20results%20back%20to%20your%20Microsoft%20Managed%20Application%20Insights%20account.%3C%2FP%3E%3CP%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3ENow%20it%E2%80%99s%20time%20to%20harvest%20insights%20into%20container%20image%20vulnerabilities.%20After%20you%E2%80%99ve%20enabled%20CI%2FCD%20scanning%20for%20images%20built%20and%20published%20from%20GitHub%20workflows%2C%20ASC%20showcases%20any%20vulnerabilities%20found%20in%20those%20images.%20Of%20course%2C%20it%E2%80%99s%20important%20to%20form%20a%20holistic%20picture%20of%20your%20data%2C%20and%20you%20can%20use%20these%20CI%2FCD%20scan%20results%20along%20with%20registry%20scan%20results%20to%20trace%20the%20lifecycle%20of%20the%20image%20from%20CI%2FCD%20to%20registry.%3C%2FP%3E%3CP%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EIt%E2%80%99s%20important%20to%20think%20of%20this%20expanded%20scanning%20capability%20as%20the%20conduit%20to%20foster%20collaboration%20among%20your%20developer%20and%20SecOps%20teams.%20CI%2FCD%20vulnerability%20scanning%20gives%20much%20needed%20visibility%20into%20container%20images%20and%20the%20GitHub%20workflows%20that%20are%20pushing%20these%20images.%20You%20can%20also%20help%20developers%20scan%20their%20container%20images%20for%20common%20vulnerabilities%E2%80%94eliminating%20issues%20before%20deploying%20to%20a%20container%20registry%2C%20a%20containerized%20web%20app%2C%20or%20a%20Kubernetes%20cluster.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3EStart%20collaborating%20with%20GitHub%20and%20Azure%3CP%3EThis%20feature%20is%20currently%20in%20Public%20Preview%20so%20please%20use%20non-production%20workflows%20while%20using%20this%20feature.%20This%20feature%20is%20available%20only%20in%20Public%20Cloud.%20You%20will%20need%20to%20use%20the%20feature%20flag%20as%20shown%20to%20use%20the%20feature%20in%20Azure%20Portal%20(%3CA%20href%3D%22https%3A%2F%2Fms.portal.azure.com%2F%3Ffeature.cicd%3Dtrue%23blade%2FMicrosoft_Azure_Security%2FSecurityMenuBlade%2F5%2F0%2F%22%20rel%3D%22nofollow%20noopener%20noreferrer%22%20target%3D%22_blank%22%3Ehttps%3A%2F%2Fms.portal.azure.com%2F%3Ffeature.cicd%3Dtrue%23blade%2FMicrosoft_Azure_Security%2FSecurityMenuBlade%2F5%2F0%2F%3C%2FA%3E).%26nbsp%3BThis%20feature%20flag%20will%20be%20removed%20in%20a%20few%20days.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3ETo%20learn%20more%20about%20container%20security%20check%20out%20%3CA%20href%3D%22https%3A%2F%2Faka.ms%2FDevSecOpsBlogDoc%22%20rel%3D%22noopener%20noreferrer%22%20target%3D%22_blank%22%3Edocumentation%3C%2FA%3E%20and%20visit%20the%20%3CA%20href%3D%22https%3A%2F%2Fazure.microsoft.com%2Fen-us%2Fproducts%2Fgithub%2F%22%20rel%3D%22noopener%20noreferrer%22%20target%3D%22_blank%22%3EGitHub%20and%20Azure%3C%2FA%3E%20page%20to%20find%20the%20full%20list%20of%20GitHub%20and%20Azure%20integrations.%20Don%E2%80%99t%20forget%20to%20check%20out%20the%20%3CA%20href%3D%22https%3A%2F%2Faka.ms%2FDevSecOpsPaper%22%20rel%3D%22noopener%20noreferrer%22%20target%3D%22_blank%22%3E6%20tips%20for%20integrating%20security%20into%20your%20DevOps%20practices%3C%2FA%3E%20whitepaper%20to%20explore%20even%20more%20ways%20to%20kickstart%20your%20DevSecOps%20journey.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EFor%20any%20questions%20regarding%20the%20public%20preview%20please%20send%20an%20email%20to%20%3CA%20href%3D%22mailto%3Aazseccontainerred%40microsoft.com%22%20rel%3D%22nofollow%20noopener%20noreferrer%22%20target%3D%22_blank%22%3Eazseccontainerred%40microsoft.com%3C%2FA%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-2357730%22%20slang%3D%22en-US%22%3E%3CP%3ECompanies%20on%20the%20forefront%20of%20digital%20transformation%20have%20seen%20DevOps%20provide%20software%20engineers%20and%20operations%20teams%20with%20a%20faster%20and%20more%20efficient%20way%20to%20develop%20code.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-2357730%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EBest%20Practices%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EGet%20Started%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E
Version history
Last update:
‎Jun 10 2021 02:49 PM
Updated by: