You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Dynatrace is adding integration with virtual registry and we wanted t… (#60600)
Co-authored-by: Copilot Autofix powered by AI <175728472+Copilot@users.noreply.github.com>
Co-authored-by: mc <42146119+mchammer01@users.noreply.github.com>
Copy file name to clipboardExpand all lines: content/code-security/how-tos/secure-your-supply-chain/establish-provenance-and-integrity/upload-linked-artifacts.md
+15-2Lines changed: 15 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,7 +14,7 @@ category:
14
14
The {% data variables.product.virtual_registry %} includes storage records and deployment records for artifacts that you build in your organization. Metadata for each artifact is provided by your organization using one of the following methods:
15
15
16
16
* A workflow containing one of {% data variables.product.company_short %}'s actions for **artifact attestations**
17
-
* An integration with the**JFrog Artifactory** or **Microsoft Defender for Cloud**
17
+
* An integration with **Dynatrace**,**JFrog Artifactory**, or **{% data variables.product.prodname_microsoft_defender %}**
18
18
* A custom script using the **artifact metadata REST API**
19
19
20
20
The available methods depend on whether you are uploading a storage record or a deployment record. For more information about record types, see [AUTOTITLE](/code-security/concepts/supply-chain-security/linked-artifacts#which-metadata-is-included).
@@ -47,7 +47,20 @@ For artifacts that do not need to be attested and are not stored on JFrog, you c
47
47
48
48
## Uploading a deployment record
49
49
50
-
If you store artifacts in **{% data variables.product.prodname_mdc_definition %}**, you can use an integration to automatically sync data to the {% data variables.product.virtual_registry %}. Otherwise, you must set up a custom integration with the **REST API**.
50
+
If you monitor deployed workloads with Dynatrace or {% data variables.product.prodname_mdc_definition %}, you can use an integration to automatically sync deployment data to the {% data variables.product.virtual_registry %}. Otherwise, you must set up a custom integration with the REST API.
51
+
52
+
### Using the Dynatrace integration
53
+
54
+
You can configure Dynatrace to send deployment records to {% data variables.product.github %} for container images running in your Dynatrace-monitored Kubernetes environments. Dynatrace maps deployed images to your repositories, then reports runtime context.
55
+
56
+
In addition, deployment records from Dynatrace can include runtime risk context, such as:
57
+
58
+
* Public internet exposure
59
+
* Sensitive data access
60
+
61
+
You can use this context in organization-level alert filtering and in security campaigns to prioritize remediation for alerts that affect internet-exposed or sensitive-data workloads.
62
+
63
+
For setup instructions, see [{% data variables.product.prodname_GHAS %} security integration - Get Started](https://docs.dynatrace.com/docs/secure/threat-observability/security-events-ingest/ingest-github-advanced-security#credentials--github-app-based-authentication) in the Dynatrace documentation.
51
64
52
65
### Using the Microsoft Defender for Cloud integration
Copy file name to clipboardExpand all lines: content/code-security/tutorials/secure-your-organization/prioritize-alerts-in-production-code.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
2
title: Prioritizing Dependabot and code scanning alerts using production context
3
3
shortTitle: Prioritize alerts in production code
4
-
intro: Focus remediation on real risk by targeting {% data variables.product.prodname_dependabot %} and {% data variables.product.prodname_code_scanning %} alerts in artifacts deployed to production, using metadata from external registries like JFrog Artifactory, your own CI/CD workflows, or from {% data variables.product.prodname_microsoft_defender %}.
4
+
intro: Focus remediation on real risk by targeting {% data variables.product.prodname_dependabot %} and {% data variables.product.prodname_code_scanning %} alerts in artifacts deployed to production, using metadata from external systems and integrations like Dynatrace, JFrog Artifactory, {% data variables.product.prodname_microsoft_defender %}, or your own CI/CD workflows.
0 commit comments