Defender for Cloud unified portal

đź”’ Development at Scale: The Security Challenge

The pace of development has scaled dramatically. Organizations now build more than 500 new applications on average each year – and as code volume grows, the gap between development and security widens. Historically, this meant tools scattered across Azure portal, GitHub dashboards, security consoles, and separate dashboards. Now? Everything is converging.

The fundamental problem: Working in separate tools with no shared context, developers can't see which threats security teams prioritize, and security teams can't easily trace issues back to their source in code. This creates a dangerous blind spot where vulnerabilities are discovered too late or never connected to their origins.

Microsoft Ignite 2025 announcement: Microsoft Defender for Cloud now natively integrates with GitHub Advanced Security (in public preview) – the first native link between runtime intelligence and developer workflows, delivering continuous protection from code to runtime. This bidirectional integration brings Defender for Cloud's runtime insights directly into GitHub, so vulnerabilities can be surfaced, prioritized, and remediated with AI assistance – all within the developer environment.

But here's what's even bigger: Defender for Cloud is now available in the unified Microsoft Defender security portal. This means GitHub organizations can be monitored and managed alongside your cloud infrastructure, all from one security dashboard. During the preview, initial GitHub setup still happens in Azure, but the unified experience is here. And Microsoft is rapidly moving toward complete feature parity, eventually putting all configuration and management in the unified portal too.

We start where every application does: in the code – and with a major step forward in how security and development teams work together.

Understanding the Problem: Why Code-to-Runtime Security Matters

Software supply chain attacks have become increasingly sophisticated, targeting the weakest links in the development pipeline. Traditional security approaches that focus on either code-time or runtime protection leave critical gaps in coverage. The rising tide of compromised dependencies, malicious commits, and runtime exploits demands a more comprehensive approach.

The Software Supply Chain Attack Landscape

Recent years have seen explosive growth in supply chain attacks:

  • Compromised Dependencies: Attackers inject malicious code into popular open-source packages used by thousands of projects
  • Build Pipeline Exploitation: Compromised build systems can inject backdoors during the compilation process
  • Runtime Exploitation: Vulnerabilities in production environments are exploited after deployment
  • Lateral Movement: Once inside, attackers use runtime context to pivot to critical assets

Traditional point solutions address only part of this problem:

  • Code scanning identifies vulnerabilities in source code but can't determine if they're actually exploitable in production
  • Runtime monitoring detects malicious behavior but can't trace issues back to their source in code
  • Dependency scanning finds vulnerable packages but lacks context about whether specific vulnerabilities are reachable or exploitable

The Developer-Security Team Disconnect

Another critical challenge is the disconnect between developers who build applications and security teams who protect them:

  • Different Tools: Developers work in GitHub; security teams use Defender for Cloud
  • Silos: Security findings often don't reach developers until late in the development cycle
  • Context Loss: Security alerts lack business context, making prioritization difficult
  • Slow Remediation: Without automated workflows, issues languish unfixed

The Solution: Unified Code-to-Runtime Security

The native integration between Microsoft Defender for Cloud and GitHub Advanced Security eliminates these gaps by:

  1. Connecting two critical security perspectives: Runtime threat intelligence informs code-level prioritization
  2. Enabling real-time collaboration: Direct integration between security and development teams
  3. Providing AI-powered remediation: Automatic fix suggestions accelerate resolution
  4. Establishing complete traceability: Track artifacts and threats from code through to runtime

How It Works

When Defender for Cloud detects a critical vulnerability in a running workload, developers see exactly where the issue originated in code, how it manifests in production, and suggestions for how to fix the vulnerability. With Copilot Autofix and GitHub Copilot coding agent capabilities, AI-generated and validated fixes are suggested in real time – shortening remediation cycles from days to hours.

Together, security, development, and AI now move as one, finding and fixing issues faster and creating a continuous feedback loop that learns from runtime, feeds insights back into development, and redefines how secure apps and agents get built in the age of AI.

Three Tangible Benefits for Organizations

1. Collaborate Without Friction

The Benefit: Security teams can open and track GitHub issues directly from Defender for Cloud with context and vulnerability details, ensuring shared visibility between security and development.

What this means:

  • No context lost in translation between tools
  • Developers see security findings where they work
  • Security teams maintain oversight of remediation progress
  • Complete audit trail for compliance

Impact: Reduced time to triage and assignment, faster developer response

2. Accelerate Remediation with AI

The Benefit: Copilot-assisted fixes make it faster and safer to resolve vulnerabilities without breaking developer flow.

What this means:

  • AI suggests secure code patterns automatically
  • Developers don't need to research security best practices
  • Generated fixes are tested and validated
  • Security improvements without development delays

Impact: Remediation time reduced from days to hours

3. Prioritize What Matters Most

The Benefit: By mapping runtime threats directly to their source in code, teams can focus on vulnerabilities that are truly exploitable – not just theoretical.

What this means:

  • Only focus on vulnerabilities with real business risk
  • Reduce false positive fatigue
  • Allocate developer time to high-impact work
  • Maximize security improvement per engineering hour

Impact: 10x improvement in vulnerability triage efficiency

Three Transformative Features

1. Real-Time Visibility Across the App Lifecycle

The Challenge: Security and development teams work in isolation, seeing only partial visibility into application security. The Solution: Native integration creates a unified view of security across the entire application lifecycle:

For Security Teams

  • Open Issues Directly in GitHub: When a vulnerability is discovered in Defender for Cloud, security teams can create a GitHub issue directly from the security dashboard
  • Security Campaign Alerts: Security teams can open targeted campaigns to notify GitHub repository owners about specific vulnerabilities
  • Real-Time Status Tracking: Monitor the progress of vulnerability remediation as developers work on fixes
  • Compliance Artifacts: Maintain an audit trail of discovered vulnerabilities, remediation efforts, and resolution

For Developer Teams

  • Alerts in Their Workflow: Notifications appear in GitHub where developers already work, not in an external security tool
  • Context and Guidance: Issues include detailed remediation suggestions and affected code references
  • Collaboration Features: Developers and security teams can collaborate directly on fixes within GitHub
  • Built-in Documentation: All remediation history and security decisions are documented in GitHub

Real-World Scenario: A security team detects a critically exploitable dependency vulnerability in a production application through Defender for Cloud's runtime analysis. Rather than sending a ticket through email or a separate system, they open a GitHub issue directly in the affected repository with priority labeling and assign it to the development team. Developers see the issue in their normal GitHub workflow and can immediately address it with full context about runtime exploitability.

2. Critical Alert Prioritization: From Code to Runtime Context

The Challenge: Security teams receive thousands of potential vulnerabilities. How do you know which ones actually matter?

The Solution: By connecting runtime context to code, organizations can prioritize based on actual exploitability:

Runtime Context as the Differentiator

The integration leverages runtime data to answer critical questions:

  • Is this vulnerability actually reachable? Code scanning might flag a vulnerable function, but if that function is never called in production, it's not exploitable
  • Is there active exploitation? Runtime monitoring shows actual attack attempts targeting specific vulnerabilities
  • What's the attack surface? Network traffic analysis reveals which systems can actually access vulnerable code
  • What's the business impact? Runtime context shows which critical applications are affected

Attack Path Analysis

The integration maps attack paths that connect:

  1. Vulnerable code (identified by code scanning)
  2. Network exposure (identified by network monitoring)
  3. Active exploitation attempts (identified by threat detection)
  4. Lateral movement paths (identified by behavior analysis)

This comprehensive view means security teams can focus on the 5-10% of vulnerabilities that actually pose real risk, rather than drowning in noise from the other 95%.

Developer Prioritization

Developers see vulnerabilities ranked by:

  • Exploitability: Can this actually be exploited in production?
  • Active Threat: Are attackers currently attempting to exploit this?
  • Business Impact: How critical are the affected systems?
  • Fix Difficulty: How much effort is required to remediate?

Developers naturally focus on fixing the easy, high-impact issues first, maximizing security improvement per hour of development effort.

Real-World Scenario: A code scan identifies 500 potential vulnerabilities in a large codebase. Without runtime context, developers would need to review and remediate all 500. With runtime context from Defender for Cloud, the system identifies that only 23 of these vulnerabilities are actually reachable in production, 8 are actively being targeted by attackers, and 3 are critical for business systems. The team focuses on those 3 first, then works through the 8 actively attacked ones, then addresses other reachable vulnerabilities. This prioritization reduces remediation time from months to weeks.

3. AI-Powered Remediation: Fixing Issues Faster with Confidence

The Challenge: Understanding a vulnerability is one thing; fixing it correctly is another. Developers need guidance to implement secure fixes efficiently.

The Solution: GitHub Copilot and Microsoft AI capabilities provide automatic fix suggestions and guidance:

Copilot Autofix for Automatic Remediation

  • Intelligent Code Generation: Copilot analyzes the vulnerable code and generates secure alternatives
  • Context-Aware Fixes: The AI understands the application's architecture and suggests fixes that fit the codebase style
  • Explanation and Education: Each suggested fix includes explanation of the vulnerability and why the fix works
  • Pull Request Ready: Generated fixes can be directly committed or reviewed as pull requests

GitHub Copilot Coding Agent

  • Extended Problem-Solving: The agent can coordinate multi-file changes needed for complex fixes
  • Testing Integration: The agent can suggest and run tests to verify fixes don't break functionality
  • Best Practice Recommendations: Agent suggests not just fixes, but security best practices for similar code patterns
  • Learning Opportunity: Developers see patterns and solutions that improve their security knowledge

Human-in-the-Loop Workflow

AI-suggested fixes go through a quality gate:

  1. AI Suggestion: Copilot generates fix options
  2. Developer Review: Developer evaluates and potentially refines the suggestion
  3. Testing: Automated tests validate the fix doesn't break functionality
  4. Security Validation: Security team optionally reviews critical fixes
  5. Deployment: Fix is merged and deployed with confidence

Real-World Scenario: A developer receives a GitHub issue about a SQL injection vulnerability in a database query. Rather than manually researching secure query patterns, Copilot Autofix immediately suggests using parameterized queries with the specific syntax for their database. The agent also identifies three other similar vulnerable patterns in the codebase and suggests fixes for those as well. The developer reviews the suggestions, runs tests to validate they work, and the entire fix set is deployed within 30 minutes rather than the day or more it would have taken for manual remediation.

Implementation Architecture

How the Integration Works

The native integration creates a secure, real-time data flow:

GitHub Repository
    ↓ (Code scanning results)
GitHub Advanced Security
    ↓ (Vulnerability data)
Integration Bridge
    ↓ (Runtime context correlation)
Microsoft Defender for Cloud
    ↓ (Threat intelligence)
Microsoft Sentinel (optional)
    ↓ (SIEM integration)
Security Operations Center

Data Flow

  1. GitHub Advanced Security scans code and identifies potential vulnerabilities
  2. Defender for Cloud monitors runtime behavior and identifies actual threats
  3. Integration Layer correlates code vulnerabilities with runtime context
  4. Risk Scoring Engine prioritizes issues based on exploitability and threat level
  5. Notification System alerts developers and security teams with actionable information

Security Considerations

The integration maintains security through:

  • Encrypted Communication: All data in transit is encrypted
  • Identity-Based Access: Integration respects GitHub and Azure RBAC
  • Audit Logging: All correlation and alerting activity is logged for compliance
  • Data Residency: Data remains in customer-designated regions
  • No Code Exposure: Runtime analysis doesn't require storing application code in Defender

The Unified Security Portal: One Dashboard, Complete Visibility

Microsoft is consolidating its security offerings into the unified Microsoft Defender security portal, bringing together threat detection, investigation, and posture management across all your environments. Defender for Cloud is now available in preview in this unified experience, which means your GitHub organizations can be monitored right alongside your cloud infrastructure.

What You Get in the Unified Portal

In the unified security portal, you now see:

Cloud Security Operations

Feature Description
Cloud Overview Dashboard Centralized view of your cloud security posture, highlighting top improvements and security trends
Cloud Asset Inventory Complete inventory of all your cloud and code assets across Azure, AWS, GCP—plus GitHub repositories
Incidents and Alerts Unified incident management across cloud, endpoint, identity, and now code-level threats
Advanced Hunting Correlate security data across all your environments to identify sophisticated attack patterns

Posture Management Unified Experience

Feature Description
Cloud Secure Score Risk-based scoring that actually reflects your exploitable exposure, not just theoretical vulnerability counts
Recommendations Prioritized remediation guidance integrated with Microsoft Security Exposure Management
Attack Paths Visual representation of how attackers could move through your infrastructure, highlighting the path of least resistance
Cloud Vulnerabilities Vulnerability data correlated with runtime context—so you see what's actually exploitable

Configuration & Control

Feature Description
Cloud Scopes & RBAC Organize Azure subscriptions, AWS accounts, GCP projects, and now GitHub organizations into logical business units with granular access control
Response Actions Automated response capabilities that can trigger across cloud, endpoint, and now code-level detections

The Transition: Azure Portal to Unified Portal

Microsoft is in a transition period—and that's important to understand:

Where you are now (Preview Phase):

  • GitHub organizations are added and initially configured in Azure portal (traditional Defender for Cloud)
  • You can view all security data—code scanning, runtime threats, posture—in the unified security portal
  • This gives you the best of both: configuration power in Azure, operational insights in the unified portal

Where this is headed:

  • Eventually, you'll be able to configure everything directly in security.microsoft.com
  • GitHub organization management will move from Azure portal to unified portal
  • All remediation, escalation, and response workflows will be available in one place
  • Microsoft is committed to feature parity—if it works in Azure portal today, it'll work in the unified portal tomorrow
  • Feature Parity: The Direction of Travel

    Here's the key thing to understand: Microsoft is moving aggressively toward feature parity. Some capabilities exist only in Azure portal today (like custom recommendations and governance workflows), but that's temporary. The unified portal is the future.

    As you implement this integration, understand that:

    • Initial setup still happens in Azure portal
    • Daily operations shift to security.microsoft.com
    • Configuration management will gradually move to the unified portal over the coming months
    • Your learning investment is protected—concepts learned in Azure portal directly transfer to unified portal as features migrate

    This transition isn't about abandoning Azure portal; it's about giving you options and gradually consolidating everything into one professional security operations center.

    Feature Comparison: Azure Portal vs. Unified Portal

    Here's a snapshot of where things stand today. Note that this comparison evolves—capabilities marked as "Azure portal only" are often coming to the unified portal soon:

    Capability Azure Portal Unified Portal
    Security Recommendations âś… Yes âś… Yes (Integrated into Exposure Management)
    Asset Inventory âś… Yes âś… Yes
    Secure Score âś… Yes âś… Yes (New risk-based scoring)
    Attack Path Analysis âś… Yes âś… Yes (Integrated into Exposure Management)
    Cloud Vulnerabilities âś… Yes âś… Yes
    Incident & Alerts âś… Yes âś… Yes
    Advanced Hunting âś… Yes âś… Yes
    Data Visualization with Workbooks ✅ Yes ⏳ Coming
    Data Exporting ✅ Yes ⏳ Coming
    Workflow Automation ✅ Yes ⏳ Coming
    Quick Fixes & Remediation ✅ Yes ⏳ Coming
    Risk Hunting with Explorer ✅ Yes ⏳ Coming
    ServiceNow Integration ✅ Yes ⏳ Coming
    Governance & Scale ✅ Yes ⏳ Coming
    Cloud Scopes & RBAC âś… Yes âś… Yes
    Agentless VM Scanning âś… Yes âś… Yes
    Container Code-to-Cloud Mapping âś… Yes âś… Yes
    IaC Code-to-Cloud Mapping âś… Yes âś… Yes
    Data Security Posture Management âś… Yes âś… Yes
    API Security Posture âś… Yes âś… Yes

    Getting Started: Making the Connection

    Ready to connect your GitHub organizations to Defender for Cloud? Here's what you need in place. Don't worry—none of this is particularly complex.

    What You'll Need

    On the GitHub side:

    • GitHub Advanced Security enabled (it's included with GitHub Enterprise or you can enable it on public repositories)
    • GitHub Actions enabled so automation can run
    • Either a GitHub organization admin or someone with the appropriate permissions to create the integration

    On the Azure side:

    • An Azure subscription with workloads that Defender for Cloud should monitor
    • Defender for Cloud enabled (you probably already have this, but confirm)
    • Appropriate permissions to create the connection (typically Identity Governance Administrator or Security Administrator)

    For the connection itself:

    • Basic network connectivity between GitHub and Azure (this happens over standard internet, no special networking required)
    • A GitHub Personal Access Token or GitHub App for secure authentication

    Getting the Connection Working

    Step 1: Make GitHub Ready

    You'll want code scanning turned on first. Jump into your GitHub repository settings and enable Advanced Security features—specifically code scanning, secret scanning, and dependency scanning. This starts the intelligence gathering.

    Step 2: Wire It Into Defender

    Head to Defender for Cloud (in Azure portal), find Environment Settings, and look for GitHub Connectors. Create a new connection and authenticate with GitHub. This is where the two platforms start talking.

    Step 3: Decide What Matters

    Configure which code scanning results should bubble up as priority in Defender. You don't need every finding with the same urgency—customize the prioritization so what reaches your security team is actually important.

    Step 4: Empower Your Developers

    Set up GitHub Actions to run automated remediation suggestions. Enable Copilot Autofix if you're using GitHub Copilot. Configure branch protection so risky code doesn't merge without security review. This turns security from a gate into part of the workflow.

    Step 5: Keep Your Eyes Open

    Monitor how well this is working. Look at your mean time to remediation (MTTR). Adjust rules if you're seeing noise. Update policies as your organization and threat landscape evolve.

    That's it. Nothing revolutionary, just sensible security automation.

    Best Practices for DevSecOps

    1. Integrate Early, Fail Fast

    • Enable scanning on new repositories from day one
    • Use branch protection rules to catch issues before merge
    • Require security reviews for high-risk changes

    2. Empower Developers

    • Provide security training focused on common vulnerabilities
    • Use AI suggestions as teaching opportunities
    • Share lessons learned from security incidents

    3. Automate Everything Possible

    • Automatic scanning on every commit
    • Automated remediation suggestions through Copilot
    • Automated testing to validate fixes

    4. Maintain Context

    • Keep security discussions in development tools (GitHub)
    • Document security decisions and rationale
    • Make security a part of code review culture

    5. Measure and Improve

    • Track mean time to remediation (MTTR) for vulnerabilities
    • Monitor false positive rates and adjust rules accordingly
    • Regularly review security metrics and trends
  • Automatic scanning on every commit
  • Automated remediation suggestions through Copilot
  • Automated testing to validate fixes
  • 4. Maintain Context

  • Keep security discussions in development tools (GitHub)
  • Document security decisions and rationale
  • Make security a part of code review culture
  • 5. Measure and Improve

  • Track mean time to remediation (MTTR) for vulnerabilities
  • Monitor false positive rates and adjust rules accordingly
  • Regularly review security metrics and trends
  • Addressing Common Concerns

    "Will this slow down development?"

    No, quite the opposite. By catching issues early and providing automated fixes, the integration actually accelerates development:
  • Fewer late-stage security findings means fewer rework cycles
  • Automated remediation reduces manual security review burden
  • Clear prioritization means less time wasted on non-critical issues
  • "What about false positives?"

    GitHub Advanced Security and Defender for Cloud both use runtime context and machine learning to minimize false positives. When correlated together, false positive rates decrease further because:
  • Code-level findings are validated against runtime behavior
  • Only actually exploitable issues are prioritized
  • Historical data improves ML model accuracy over time
  • "How does this affect compliance?"

    The integration improves compliance posture by:
  • Creating complete audit trail from vulnerability discovery to remediation
  • Enabling policy enforcement at the code level
  • Providing evidence of security monitoring and remediation
  • Supporting regulatory requirements for secure development practices
  • "What about legacy applications or on-premises workloads?"

    The integration works across hybrid environments:
  • On-premises applications can be monitored by Defender for Cloud via Arc
  • GitHub repositories can contain code for any platform or technology
  • The correlation works regardless of where code runs or how it's deployed
  • Real-World Implementation Scenarios

    Scenario 1: SaaS Company with Rapid Release Cycle

    Challenge: Releases happen multiple times per week, and security concerns slow down development Solution:
  • GitHub Advanced Security catches code issues at commit time
  • Copilot Autofix suggests remediation automatically
  • Developers merge with confidence knowing issues are addressed
  • Defender for Cloud provides runtime validation
  • Result: No reduction in velocity, improved security posture
  • Scenario 2: Financial Services Organization

    Challenge: Strict compliance requirements and extensive security review processes Solution:
  • Automated code scanning ensures compliance violations are caught early
  • Runtime context from Defender shows which vulnerabilities actually pose risk
  • Clear audit trail of all security decisions supports compliance audits
  • AI-suggested fixes accelerate remediation without compromising quality
  • Result: Compliance requirements met with less manual effort
  • Scenario 3: Enterprise with Complex Supply Chain

    Challenge: Multiple teams, multiple vendors, complex dependencies Solution:
  • Centralized visibility in Defender for Cloud across all repositories
  • Automated alerts when vulnerable dependencies are introduced
  • Coordinated remediation across dependent systems
  • Supplier security posture visible in Defender dashboards
  • Result: Supply chain risk significantly reduced
  • What You Can Actually Do with Defender for Cloud (Complete Feature Set)

    If you're wondering whether Defender for Cloud is mature enough for your organization, here's the complete feature landscape available to you right now:

    Cloud Security Operations

    Feature What It Does
    Cloud Overview Dashboard Your security control center showing key metrics, top improvement actions, and trend analysis across your entire cloud footprint
    Cloud Asset Inventory Complete visibility into every asset across Azure, AWS, GCP, and GitHub—organized by workload, criticality, and coverage level

    Posture Management

    Feature What It Does
    Cloud Secure Score Risk-based scoring that weighs exploitability and threat level, not just vulnerability counts
    Recommendations Prioritized, actionable security improvements with guidance and (in many cases) one-click remediation
    Attack Paths Visual representation of how an attacker could traverse your infrastructure—showing your most dangerous exposure
    Cloud Vulnerabilities Unified view of all vulnerabilities with context about actual exploitability in your environment

    Threat Detection & Response

    Feature What It Does
    Incidents and Alerts Correlated security events that tell a story of what's happening across your infrastructure
    Response Actions Automated playbooks and manual actions to contain and remediate threats in real-time
    Advanced Hunting Query-based investigation to hunt for sophisticated threats and validate incident response

    Configuration & Control

    Feature What It Does
    Cloud Scopes & RBAC Organize resources by business unit with granular role-based access control—so people see only what they need

    This complete feature set is available both in Azure portal and gradually rolling into security.microsoft.com.

    Where This Actually Takes You

    Let's be direct: this integration represents a fundamental shift in how application security works. You're not just getting two tools talking to each other; you're getting a complete security framework that understands your applications from the moment code is committed through every moment it runs in production.

    The practical reality:

    • Vulnerabilities get fixed before they become production incidents
    • Your development teams stop thinking of security as an obstruction and start seeing it as enablement
    • Your security team reduces alert fatigue from thousands of false positives and focuses on what actually matters
    • Your organization builds applications that are fundamentally more secure—not because of compliance requirements, but because security is woven into the development process

    This is DevSecOps that actually works, powered by cloud-native architecture and AI-assisted remediation. It's not a theoretical best practice; it's what modern application security looks like in 2025.

    The unified portal in security.microsoft.com is the control center. Start in Azure portal for configuration. Build your implementation. Then watch as Microsoft rapidly brings parity features to the unified experience. This is where your organization's security operations is headed—one integrated dashboard, complete visibility, and the ability to see threats from code to runtime.

    Resources & Next Steps

    Want to dive deeper? Here are the resources to get you started:


    Ready to bring your development and security teams together? Start with the GitHub integration in Defender for Cloud. Connect your first repository. See how code-scanning findings correlate with runtime threats. Experience the difference that unified visibility actually makes.

    Your future security operations are waiting—starting with a single integration, expanding to complete visibility, ending with code and runtime threats handled together instead of in silos.

    You can do this

    Archives