Developer Productivity — GitHub Technical Insiders

Agentic AI for DevSecOps

Transforming Security with GitHub Advanced Security + GitHub Copilot + Microsoft Defender for Cloud

📅 April 2, 2026 👤 Calin Lupas & Emmanuel Knafo 🏢 Microsoft Canada

01 Why DevSecOps Matters Now

The software supply chain is the primary attack vector. Security must be embedded into every phase of development.

The Threat Landscape

🔥

SolarWinds

Vulnerable supply chain & build machine — 18,000 customers impacted

🔑

Codecov

Leaked developer secrets — Up to 29,000 customers at risk

🪵

Log4j

Vulnerable source code — 40% of business networks globally. 100 attacks/minute at peak.

#1
Applications are the top attack vector
Verizon DBIR 2024
65%
of vulnerabilities still exist after 3 months
Veracode SOSS 2024
5%
of companies avoided web app attacks in production
Contrast Security 2024
70.8%
of organizations have security debt
Veracode SOSS 2024

Industry Standards Alignment

FrameworkScopeRelevance
NIST SSDFSecure Software Development FrameworkU.S. federal and private sector baseline
SLSASupply-chain Levels for Software ArtifactsBuild integrity and provenance verification
Cyber Resilience Act (CRA)EU legislation on software securityMandatory for EU market software products
OpenSSF ScorecardOpen-source security posture scoringAutomated dependency risk evaluation

The Economics of Shifting Left

$80
Development
$240
Build (3×)
$960
Test / QA (12×)
$7,600
Production (95×)
$4.88M
Breach (avg)
IBM 2024
MetricValueSource
Cost multiplier100× more expensive to fix in production vs. developmentNIST & IBM Systems Sciences Institute
Exploitation growth180% growth in vulnerability exploitation as initial breach accessVerizon DBIR 2024
Release pressure79% say DevOps teams face increasing pressure to shorten cyclesContrast Security 2024
Security debt70.8% of organizations have security debt; 89.4% in first-party codeVeracode SOSS 2024

From DevOps → Agentic DevSecOps

graph LR
    A["DevOps\nPeople + Process + Tech\n→ Continuous value delivery"] -->
    B["DevSecOps\nSecurity as shared responsibility\n→ Secure continuous delivery"] -->
    C["Agentic DevOps\nAI agents as team members\n→ Automate & accelerate"] -->
    D["Agentic DevSecOps\nAI agents with security built in\n→ Secure AI-accelerated delivery"]

    style A fill:#1e3a5f,stroke:#3b82f6,stroke-width:2px,color:#e6edf3
    style B fill:#1e1b4b,stroke:#4f46e5,stroke-width:2px,color:#e6edf3
    style C fill:#3b0764,stroke:#7c3aed,stroke-width:2px,color:#e6edf3
    style D fill:#064e3b,stroke:#059669,stroke-width:3px,color:#e6edf3
    

Three Barriers — Solved by Agentic DevSecOps

🏢

Organization & Team Gaps

Security teams isolated from engineering → Agents embed security in developer workflow

📚

Skill & Knowledge Gaps

Developers lack security expertise → Agents provide just-in-time education

🔧

Tooling Friction

Security tools not built for devs → Agents detect, explain, fix in real-time

02 GitHub Advanced Security — Deep Dive

GitHub is the world's largest developer platform with ~150 million developers. GHAS brings native, first-party security directly into this platform — not bolted on, but built in. The mission: shift the burden from your team to your tools.

Product Structure (Post April 2025)

Announced March 4, 2025, GA April 1, 2025 — GHAS restructured into two standalone products, now available on GitHub Team plans:

ProductWhat's IncludedPrice
GitHub Secret ProtectionSecret scanning, push protection, AI-powered generic detection, custom patterns, delegated bypass, validity checks$19/mo per active committer
GitHub Code SecurityCodeQL code scanning, Copilot Autofix, Dependabot, security campaigns, third-party SARIF$30/mo per active committer
GHES Note: On GitHub Enterprise Server, GHAS continues as a bundled add-on to the Enterprise license and was not restructured into the standalone Secret Protection / Code Security products.

🔒 Prevent: Secret Protection & Push Protection

💡 Stolen or leaked credentials remain the #1 initial attack vector in data breaches, responsible for the largest share of incidents year over year. — IBM Cost of a Data Breach 2021 & 2023
flowchart TD
    A["Developer pushes code"] --> B{"Push Protection\nScanner"}
    B -->|No secret found| C["✅ Push succeeds"]
    B -->|Secret detected| D["🚫 Push BLOCKED"]
    D --> E["Developer sees:\nSecret type, File, Line, Options"]
    E --> F["Remove the secret"]
    E --> G["Mark as false positive"]
    E --> H["Request delegated bypass"]
    H --> I["Security reviewer notified"]
    I --> J{"Reviewer decision"}
    J -->|Approve| K["Push allowed + Audit trail"]
    J -->|Deny| L["Push remains blocked"]

    style A fill:#1e1b4b,stroke:#4f46e5,color:#e6edf3
    style B fill:#3b0764,stroke:#7c3aed,color:#e6edf3
    style C fill:#064e3b,stroke:#059669,color:#e6edf3
    style D fill:#881337,stroke:#e11d48,color:#e6edf3
    style E fill:#78350f,stroke:#d97706,color:#e6edf3
    style F fill:#064e3b,stroke:#059669,color:#e6edf3
    style G fill:#1e293b,stroke:#64748b,color:#e6edf3
    style H fill:#3b0764,stroke:#7c3aed,color:#e6edf3
    style K fill:#064e3b,stroke:#059669,color:#e6edf3
    style L fill:#881337,stroke:#e11d48,color:#e6edf3
    
CapabilityDescription
Partner Patterns200+ partner patterns covering 400+ token types from cloud providers, SaaS platforms, and package registries
Copilot Secret ScanningAI/ML-powered detection of unstructured secrets — passwords, connection strings, generic credentials
Custom PatternsOrganization-defined regex for internal secret formats
Validity ChecksAutomated verification with partner APIs to confirm if a detected secret is still active
Push ProtectionServer-side real-time blocking before secrets reach the repository
Delegated BypassGovernance workflow requiring security team approval for exceptions
Free Secret Risk AssessmentPoint-in-time scan of all repos (incl. private/internal/archived) — no license required

🔍 Detect: Code Scanning with CodeQL

CodeQL is GitHub's semantic code analysis engine — treats code as data by building a relational database and running security queries.

LanguageBuild ModeNotes
C/C++autobuild or manualRequires compilation
C#autobuild or manual.NET framework support
GoautobuildAutomatic
Java/Kotlinautobuild or manualMaven/Gradle support
JavaScript/TypeScriptNo build required
PythonNo build required
RubyNo build required
Swiftautobuild or manualmacOS runners required
RustautobuildRust editions 2021 and 2024
GitHub ActionsNo build requiredScans workflow YAML for injection and security issues

🔧 Fix: Copilot Autofix — AI-Powered Remediation

flowchart LR
    A["CodeQL\nAlert"] --> B["Autofix Engine\nLLM + CodeQL Context"]
    B --> C["Analyze:\nCWE, data flow"]
    C --> D["Generate:\nCode fix + explanation"]
    D --> E["Validate:\nFix doesn't break"]
    E --> F["PR Comment:\nExplanation + Diff\n+ One-click apply"]

    style A fill:#881337,stroke:#e11d48,color:#e6edf3
    style B fill:#3b0764,stroke:#7c3aed,color:#e6edf3
    style C fill:#1e293b,stroke:#64748b,color:#e6edf3
    style D fill:#1e293b,stroke:#64748b,color:#e6edf3
    style E fill:#1e293b,stroke:#64748b,color:#e6edf3
    style F fill:#064e3b,stroke:#059669,stroke-width:2px,color:#e6edf3
    

Speed Impact (Source: GitHub — "Found means fixed")

All alerts (avg)
28 min vs 1.5 hr
Cross-site Scripting
22 min vs 2.8 hr
12×
SQL Injection
18 min vs 3.7 hr

📈 Scale: Security Campaigns & Debt Reduction

flowchart TD
    A["Security Manager identifies\nsystemic vulnerability"] --> B["Create Campaign:\nTarget CWEs across repos"]
    B --> C["GitHub generates Issues\nwith Autofix suggestions\n(up to 1,000 alerts)"]
    C --> D["Developers receive:\nVulnerability details + Autofix\n+ Runtime context from MDC"]
    D --> E["Campaign Dashboard:\nFixed / Open / In-Progress\nPer-team metrics + SLA"]
    E --> F["Bidirectional sync:\nGitHub ↔ Defender for Cloud"]

    style A fill:#881337,stroke:#e11d48,color:#e6edf3
    style B fill:#1e1b4b,stroke:#4f46e5,color:#e6edf3
    style C fill:#3b0764,stroke:#7c3aed,color:#e6edf3
    style D fill:#064e3b,stroke:#059669,color:#e6edf3
    style E fill:#1e3a5f,stroke:#3b82f6,color:#e6edf3
    style F fill:#064e3b,stroke:#059669,stroke-width:2px,color:#e6edf3
    
70.8%
Organizations with security debt
89.4%
Security debt in first-party code
46.6%
Flaws that become security debt

📦 Protect: Supply Chain Security

FeatureFunctionAutomation
Dependency GraphMaps all direct + transitive dependenciesAutomatic
Dependabot AlertsMatches against GitHub Advisory DatabaseAutomatic
Dependabot Security UpdatesCreates PRs to update vulnerable dependenciesSemi-automatic
Dependabot Version UpdatesKeeps dependencies current on scheduleConfigurable
Dependency ReviewPR gate to prevent adding new vulnerabilitiesAutomatic
Artifact AttestationsBuild provenance and integrity verification (SLSA)Workflow
SBOM GenerationSoftware Bill of Materials for complianceWorkflow

03 Secure Across the Stack — GHAS + MDC

GitHub Advanced Security + Microsoft Defender for Cloud = Code-to-Cloud security fabric.

Microsoft Defender for Cloud — DevOps Security

graph TB
    subgraph MDC["MICROSOFT DEFENDER FOR CLOUD"]
        direction TB
        DSPM["DevOps Security Posture Management"]
        AGS["Agentless Code Scanning\nZero YAML, zero pipeline changes"]
        PRA["Pull Request Annotations\nIaC findings in developer workflow"]
        CSPM["Defender CSPM\nCloud Security Posture Management"]
        APA["Attack Path Analysis\nChained vulnerability risk"]
        C2C["Code-to-Cloud Mapping\nSource repo ↔ Cloud workload"]
    end

    subgraph CONN["Multi-Pipeline Support"]
        GH["GitHub — Native GitHub App"]
        ADO["Azure DevOps — Extension"]
        GL["GitLab — OAuth"]
    end

    CONN --> MDC

    style MDC fill:#1a0a2e,stroke:#7c3aed,stroke-width:2px,color:#e6edf3
    style CONN fill:#0c1929,stroke:#3b82f6,stroke-width:2px,color:#e6edf3
    style DSPM fill:#2d1654,stroke:#7c3aed,color:#e6edf3
    style AGS fill:#2d1654,stroke:#7c3aed,color:#e6edf3
    style PRA fill:#2d1654,stroke:#7c3aed,color:#e6edf3
    style CSPM fill:#2d1654,stroke:#7c3aed,color:#e6edf3
    style APA fill:#2d1654,stroke:#7c3aed,color:#e6edf3
    style C2C fill:#2d1654,stroke:#7c3aed,color:#e6edf3
    

Agentless Code Scanning

ScannerTargetLanguage / Framework
BanditApplication codePython
ESLint (security rules)Application codeJavaScript / TypeScript
CheckovIaCTerraform, Kubernetes, Dockerfile, ARM, Bicep, CloudFormation
Template AnalyzerIaCARM, Bicep
TrivyDependenciesOS packages and repo manifests (npm, pip, Maven, NuGet, Go, Cargo)
SyftSBOMGenerates dependency inventory across 30+ ecosystems

Code-to-Cloud Mapping & Attack Path Analysis

graph LR
    A["GitHub Repo\nSQL Injection in /src/api\nCodeQL finding"] -->|builds| B["Container Image\nVulnerable base image\nRegistry scan"]
    B -->|deploys to| C["AKS Pod\nInternet exposed\nSensitive data access"]
    C --> D["ATTACK PATH\nCRITICAL 9.8"]
    D --> E["Internet Exposure"]
    D --> F["Sensitive Data"]
    D --> G["Code Vuln + Unpatched Base"]
    D --> H["Lateral Movement"]

    style A fill:#4a1530,stroke:#e11d48,stroke-width:2px,color:#e6edf3
    style B fill:#42290a,stroke:#d97706,stroke-width:2px,color:#e6edf3
    style C fill:#4a1530,stroke:#e11d48,stroke-width:2px,color:#e6edf3
    style D fill:#4a1042,stroke:#db2777,stroke-width:3px,color:#e6edf3
    style E fill:#3d0f1e,stroke:#f43f5e,color:#e6edf3
    style F fill:#3d0f1e,stroke:#f43f5e,color:#e6edf3
    style G fill:#3d0f1e,stroke:#f43f5e,color:#e6edf3
    style H fill:#3d0f1e,stroke:#f43f5e,color:#e6edf3
    

GHAS + MDC Integration Architecture

graph TB
    subgraph DEV["DEVELOPER INNER LOOP"]
        IDE["IDE + Copilot"] --> PUSH["git push\n+ Push Protection"]
        PUSH --> PR["Pull Request\n+ Code Review"]
        PR --> CICD["CI/CD Pipeline"]
    end

    subgraph GHAS["GITHUB ADVANCED SECURITY"]
        SP["Secret Protection\n+ Push Protection"]
        CS["CodeQL Code Scanning\n+ Copilot Autofix"]
        DEP["Dependabot\nSupply Chain Security"]
        SC["Security Campaigns"]
    end

    subgraph BRIDGE["GHAS + MDC INTEGRATION"]
        C2C["Bidirectional Sync\nAlerts, Context, Fix Status"]
    end

    subgraph MDCS["MICROSOFT DEFENDER FOR CLOUD"]
        DSPM["DevOps Security\nPosture Mgmt"]
        AGS["Agentless Code\n+ IaC Scanning"]
        CSPM["Defender CSPM\n+ Attack Paths"]
        PRA["PR Annotations"]
    end

    subgraph CLOUD["CLOUD WORKLOADS"]
        RC["Runtime Context\nInternet, Data, Identity, Network"]
    end

    DEV --> GHAS
    GHAS --> BRIDGE
    BRIDGE --> MDCS
    MDCS --> CLOUD

    style DEV fill:#0c1929,stroke:#3b82f6,stroke-width:2px,color:#e6edf3
    style GHAS fill:#1a1540,stroke:#4f46e5,stroke-width:2px,color:#e6edf3
    style BRIDGE fill:#0a2e1e,stroke:#059669,stroke-width:3px,color:#e6edf3
    style MDCS fill:#1a0a2e,stroke:#7c3aed,stroke-width:2px,color:#e6edf3
    style CLOUD fill:#0a1e2e,stroke:#0ea5e9,stroke-width:2px,color:#e6edf3
    

Production-Aware Alert Prioritization

Risk FactorSourceImpact
Internet ExposureMDC Network Analysis+Critical if public-facing
Sensitive Data AccessMDC Data Classification+High if PII/financial data
Critical ResourceMDC Resource Tags+High if production workload
Lateral MovementMDC Attack Path Analysis+Critical if pivot point
Identity RiskMDC Identity Analysis+High if over-permissioned

Licensing Requirements

FeatureRequired License
GHAS Code Scanning (CodeQL)GitHub Code Security
GHAS Secret Scanning + Push ProtectionGitHub Secret Protection
Copilot AutofixGitHub Code Security (included)
Copilot Coding AgentAny paid GitHub Copilot plan
MDC DevOps Security (basic)Defender for Cloud (Free tier)
MDC Agentless Scanning + PR AnnotationsDefender CSPM
MDC Attack Path AnalysisDefender CSPM
GHAS + MDC Native IntegrationGitHub Code Security + Defender CSPM

04 Agentic AI for DevSecOps

AI-powered agents operating as members of your dev team — automate, optimize, and secure every stage of the SDLC.

The Agentic Evolution

📊 Developers spend only ~20% of their time writing code. The other 80% goes to planning, securing, governing, and maintaining. Agentic AI reclaims that 80% by embedding autonomous agents across the entire lifecycle.
DimensionWithout AgentsWith Agents
Competence — What they knowLimited to individual expertiseAI provides security knowledge on-demand
Capability — What they can doConstrained by tooling familiarityAgents detect, explain, fix, and validate
Capacity — How much they can doBounded by human hoursAgents work in parallel, asynchronously
graph TB
    subgraph BEFORE["TRADITIONAL DevSecOps"]
        B1["Manual code review"]
        B2["Security team bottleneck"]
        B3["Delayed remediation\nweeks / months"]
        B4["Skill gaps block adoption"]
    end

    subgraph AFTER["AGENTIC DevSecOps"]
        A1["AI agents detect & fix\nin real-time"]
        A2["Security embedded in\ndeveloper workflow"]
        A3["Immediate remediation\nminutes / hours"]
        A4["Just-in-time education"]
    end

    BEFORE -->|"Agentic Transformation"| AFTER

    style BEFORE fill:#4a1530,stroke:#e11d48,stroke-width:2px,color:#e6edf3
    style AFTER fill:#0a2e1e,stroke:#059669,stroke-width:2px,color:#e6edf3
    

GitHub Copilot Coding Agent

Generally available since May 19, 2025 for all paid Copilot subscribers. Operates as an autonomous team member.

flowchart TD
    A["Assign GitHub Issue\nto Copilot"] --> B["👀 Agent starts\nSecure sandbox via\nGitHub Actions"]
    B --> C["Clones repo → Sets up env\n→ Analyzes with RAG"]
    C --> D["Edits → Builds → Tests\nPushes to draft PR"]
    D --> E["Requests human review\nResponds to PR comments"]
    E --> F["Human approves\n→ CI/CD → Merged"]

    style A fill:#1e1b4b,stroke:#4f46e5,color:#e6edf3
    style B fill:#3b0764,stroke:#7c3aed,color:#e6edf3
    style C fill:#1e293b,stroke:#64748b,color:#e6edf3
    style D fill:#1e293b,stroke:#64748b,color:#e6edf3
    style E fill:#78350f,stroke:#d97706,color:#e6edf3
    style F fill:#064e3b,stroke:#059669,stroke-width:2px,color:#e6edf3
    

Built-in Security Policies

PolicyProtection
Branch restrictionsAgent can only push to branches it created
Review enforcementRequester cannot approve the agent's PR
Network isolationInternet access limited to trusted destinations (customizable)
CI/CD gatingActions workflows require human approval before running
Existing rules applyRepository rulesets and org policies fully enforced

Custom Security Agents

Specialized versions of the Copilot coding agent tailored to security workflows:

🛡️

Security Main Agent

Reviews repository for security issues and produces a comprehensive security report

🔍

Security Code Review Agent

Security-focused code reviewer checking for common vulnerabilities (CWEs)

📋

Security Plan Creation Agent

Threat modelling and security architecture with framework expertise

⚙️

Security Pipeline Agent

Detects CI workflow weaknesses, auto-patches GitHub Actions & Azure DevOps YAML

🏗️

Security IaC Agent

Finds insecure defaults and misconfigurations across IaC and cloud configs

📦

Security Supply Chain Agent

Detects secret leaks, dependency risks, and repo misconfigurations with PR-ready fixes

End-to-End Agentic Architecture

graph TB
    subgraph PREVENT["🔒 PREVENT"]
        P1["Secret Protection\nPush Protection"]
        P2["Copilot Secret Scanning\nAI-powered detection"]
        P3["Custom Security Agents\nPre-commit in VS Code"]
    end

    subgraph DETECT["🔍 DETECT"]
        D1["CodeQL Code Scanning"]
        D2["MDC Agentless Scanning"]
        D3["Dependabot"]
        D4["MDC PR Annotations"]
    end

    subgraph FIX["🔧 FIX"]
        F1["Copilot Autofix"]
        F2["Copilot Coding Agent"]
        F3["Security Campaigns"]
        F4["Custom Security Agents"]
    end

    subgraph MONITOR["📊 MONITOR"]
        M1["Defender CSPM\nAttack Paths"]
        M2["Code-to-Cloud Mapping"]
        M3["Security Overview\nDashboard"]
        M4["Audit Logs → SIEM"]
    end

    PREVENT --> DETECT --> FIX --> MONITOR
    MONITOR -->|"Runtime context\nenriches prioritization"| DETECT

    style PREVENT fill:#0a2e1e,stroke:#059669,stroke-width:2px,color:#e6edf3
    style DETECT fill:#0c1929,stroke:#4f46e5,stroke-width:2px,color:#e6edf3
    style FIX fill:#1a0a2e,stroke:#7c3aed,stroke-width:2px,color:#e6edf3
    style MONITOR fill:#2e1f0a,stroke:#d97706,stroke-width:2px,color:#e6edf3
    

05 DevSecOps Blueprint

Complete tooling matrix and maturity model for implementing Agentic DevSecOps at scale.

DevSecOps Tooling Matrix

CategoryGuidelineTools & CapabilitiesAutomation
Secrets ScanningDetect and prevent hard-coded secretsGitHub Secret Protection, Push Protection, Copilot Secret Scanning, Custom PatternsAutomatic
SCAManage dependency risksDependabot, Dependency Review, Artifact Attestations, SBOM, OpenSSF Scorecard, SLSAWorkflow / Auto
SASTDetect code vulnerabilitiesCodeQL (Default & Advanced), Copilot Autofix, 3rd Party SARIFWorkflow / Auto
IaC ScanningSecure infrastructure configsMSDO: Checkov, Template Analyzer, Terrascan, TrivyWorkflow
CISSecure container supply chainMSDO: Checkov, Terrascan, Trivy, Anchore GrypeWorkflow
DASTTest running applicationsOWASP ZAP (maintained by Checkmarx)Workflow
Continuous ScanningRuntime posture monitoringMicrosoft Defender for Cloud, Sentinel, Azure PolicyWorkflow / Auto
ComplianceGovernance & auditGHAS Security Configurations (Policy-as-Code), Delegated Bypass, Audit LogsEnforced

Shift-Left Security Maturity Model

LevelPracticeTools
L1 — ReactiveManual security reviewsAd-hoc scanning
L2 — AutomatedCI/CD-integrated scanningCodeQL default setup, Dependabot
L3 — ProactivePush protection, PR gatesSecret scanning push protection, CodeQL PR checks
L4 — ContextualRuntime-aware prioritizationGHAS + MDC, attack path analysis
L5 — AgenticAI-powered autonomous securityCopilot Autofix, Coding Agent, Campaigns, Custom Agents

Recommended Rollout

Phase 1 — Foundation

Enable & Connect

  • Enable GHAS on all repos
  • Connect GitHub to MDC
  • Enable secret scanning + push protection
  • Configure Dependabot
Phase 2 — Hardening

Strengthen & Enforce

  • Advanced CodeQL for critical repos
  • Agentless scanning in MDC
  • PR annotations + delegated bypass
  • MSDO workflow integration
Phase 3 — Intelligence

Contextualize & Campaign

  • GHAS + MDC native integration
  • Attack path analysis
  • Security campaigns
  • Copilot Autofix on all repos
Phase 4 — Agentic

Automate & Scale

  • Copilot Coding Agent for security
  • Custom security agents
  • Audit logs to SIEM
  • Track debt reduction KPIs

06 Key Takeaways & Call to Action

Agentic DevSecOps — where we're going and how to get started.

🤖

Agentic DevSecOps is Essential

For building secure AI apps and agents at scale — security as a first-class citizen of every workflow

🔗

GHAS + GHCP + MDC

Together provide a comprehensive code-to-cloud security fabric — bidirectional, contextual, AI-driven

3–12× Faster Remediation

Copilot Autofix and the Coding Agent dramatically reduce manual remediation effort

📐

Scalable Blueprint

Operationalize application security at scale while maintaining development velocity

🔄

Reusable Patterns

Proven guidelines to detect secrets, dependencies, and code vulnerabilities automatically

Which DevSecOps agents will you be creating?

Shift security left · Leverage agentic AI · Accelerate secure innovation · Reduce security debt

Demo repo: githubabcs-devops/gh-advsec-devsecops

Demo: What Was Demonstrated

#ScenarioTools in Action
1Secret detected & blocked — Push protection preventing a GitHub PAT from being committedGitHub Secret Protection, Push Protection
2Copilot Autofix in action — SQL injection fixed in <30 seconds with one-click applyCodeQL, Copilot Autofix
3Custom security agent — Security IaC Agent finding misconfigured Kubernetes RBACCustom Agents, VS Code
4Security campaign dashboard — Org-wide XSS remediation campaignSecurity Campaigns, Copilot Autofix
5MDC code-to-cloud — Tracing a code vulnerability to its internet-exposed runtimeDefender CSPM, Attack Path Analysis

07 References

All sources used in this guide — grounded in public GitHub, Microsoft, and industry documentation.

GitHub Documentation

ResourceURL
About GitHub Advanced Securitydocs.github.com
GHAS Product Restructure (March 2025)github.blog/changelog
CodeQL Documentationcodeql.github.com
Copilot Autofix — Found Means Fixedgithub.blog
Copilot Coding Agent (GA)github.blog
Copilot — The Agent Awakensgithub.blog
About Custom Agentsdocs.github.com
Secret Scanning Documentationdocs.github.com

Microsoft Documentation

ResourceURL
Defender for Cloud DevOps Securitylearn.microsoft.com
GHAS Integration with MDClearn.microsoft.com
Connect GitHub to Defender for Cloudlearn.microsoft.com
Agentless Code Scanninglearn.microsoft.com
Attack Path Analysislearn.microsoft.com

Industry Reports

ResourceSource
Data Breach Investigations Report 2024Verizon
Cost of a Data Breach Report 2024IBM
State of Software Security 2024Veracode
State of DevSecOps Report 2024Contrast Security
NIST Secure Software Development FrameworkNIST
SLSA Frameworkslsa.dev