Skip to main content
With the Azure DevOps integration, you can connect your repositories to Plerion Code Security. This enables automatic scanning for IaC and SCA issues, giving developers early feedback and helping teams resolve issues before they reach production.

Steps to integrate Azure DevOps with Plerion

1

On the Plerion dashboard, go to Settings > Integrations

Plerion dashboard showing Settings expanded with Integrations selected
2

Find Azure DevOps and click the + button

Integrations page showing Azure DevOps tile with plus button
3

Select a connection option and click Continue

Plerion connects to Azure DevOps using a service principal. Select Connect with service principal and click Continue.
Connection options screen with Service Principal selected
4

Enter a name for your integration

Integration name field in Plerion Azure DevOps setup
5

Enter your Application (client) ID and Directory (tenant) ID

These values come from your Azure app registration.
Application ID and Directory ID fields in Plerion Azure DevOps setup
6

Enter your client secret and click Next

Client secret field and Next button in Plerion Azure DevOps setup
7

Select the organization and click Next

If the Entra app has access to a single Azure DevOps organization, this step is skipped.
Organization selection screen in Plerion Azure DevOps setup
8

After setup, you will be redirected to the Plerion platform

Your Azure DevOps integration is now active and ready to configure.
Plerion integration page showing Azure DevOps organization connected

Configuring your Azure DevOps integration

Once installed, you can configure the Azure DevOps integration to suit your workflows. These options control when and how scans run, how findings are handled, and what rules apply.

Integration status

Controls whether Plerion Code Security is active.
  • Default: Enabled
  • When disabled: Pauses all scanning activities, including scheduled and pull request scans
  • Recommendation: Keep enabled unless there is a specific need to pause
Integration status toggle in Plerion for Azure DevOps

Scheduled scans

Runs automatic daily scans of your main branches.
  • Default: Enabled
  • Purpose: Ensures continuous monitoring of production-ready code
  • Key points:
    • No manual input required
    • Helps identify risks over time
    • Best for stable branches
Scheduled scans configuration in Plerion for Azure DevOps

Pull request scanning

Scans code in new and updated pull requests.
  • Default: Enabled
  • What it does:
    • Scans only changes in the pull request
    • Posts findings as comments in Azure DevOps
    • Uses Azure DevOps status checks to block insecure merges
  • Supported file types: YAML, Terraform, JSON, and other IaC files
  • Why it matters: Prevents findings from merging, encourages secure practices, and improves developer awareness
Pull request scanning configuration in Plerion for Azure DevOps

Dismiss behavior

Controls how Plerion handles existing pull request comments when new commits are pushed.
Dismiss behavior configuration in Plerion for Azure DevOps

Tolerance for blocking pull requests

Controls when pull requests are blocked based on severity.
  • Default: Do not block pull requests
  • Options:
    • Only block for critical findings
    • Block for high and critical findings
    • Block for medium and above findings
    • Block for any finding
    • Do not block pull requests
  • Best use: Choose based on your team’s risk tolerance, development velocity, and compliance needs
Tolerance configuration options in Plerion for Azure DevOps

Profile

Defines which detection rules are used during scans.
  • Default: Organization’s default profile
  • Options: Use an existing profile or create a new one
  • Where to manage: Detection Settings
  • Best use: Align with coding standards, risk tolerance, and compliance needs
Profile selection in Plerion Azure DevOps integration

Best practices

  • Keep the integration enabled for continuous coverage
  • Use scheduled scans to secure long-term branches
  • Enable PR scanning to prevent insecure code from merging
  • Set PR blocking tolerance based on your security posture
  • Select a detection profile that matches your organization’s needs