The integration between GitHub Advanced Security and Microsoft Defender for Cloud is now generally available. It connects code, build artifacts, and runtime context to help teams track and remediate security risks. Defender for Cloud maps deployed container images back to their GitHub source repositories using artifact attestations and runtime intelligence. Runtime context such as internet exposure or sensitive data processing is surfaced directly in GitHub via the Deployment Record API. New runtime-aware filters (has:deployment, runtime-risk:) are available in code scanning, Dependabot, and security campaign views. Teams can also assign critical issues to GitHub Copilot coding agent directly from the interface.
Table of contents
Code-to-cloud correlation with Microsoft Defender for CloudRuntime risk context from Microsoft Defender for CloudRuntime-aware filtering and campaign targetingGetting startedSort: