Skip to content

Commit 4480730

Browse files
authored
DOCS-12596: Add PR Gates to IaC Security docs (#32697)
* Add section for PR Gates * Minor edits
1 parent 0379f42 commit 4480730

File tree

1 file changed

+12
-1
lines changed
  • content/en/security/code_security/iac_security

1 file changed

+12
-1
lines changed

content/en/security/code_security/iac_security/_index.md

Lines changed: 12 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,6 +15,9 @@ further_reading:
1515
- link: "/security/code_security/iac_security/iac_rules/"
1616
tag: "Documentation"
1717
text: "IaC Security Rules"
18+
- link: "/pr_gates/"
19+
tag: "Documentation"
20+
text: "PR Gates"
1821
---
1922

2023
Datadog Infrastructure as Code (IaC) Security detects misconfigurations in Terraform and Kubernetes configurations before they're deployed. It flags issues such as missing encryption or overly permissive access in files stored in your connected GitHub, GitLab, or Azure DevOps repositories. Supported file types include standalone Terraform files, local modules, and Kubernetes manifests.
@@ -31,6 +34,12 @@ IaC Security integrates with your repositories to continuously scan for misconfi
3134

3235
When a pull request includes infrastructure-as-code changes, Datadog adds inline comments to flag any violations. Where applicable, it also suggests code fixes that can be applied directly in the pull request. You can also open a new pull request from Datadog to remediate a finding. For more information, see [Pull Request Comments][5].
3336

37+
### Automatically block risky changes with PR Gates
38+
39+
Use [PR Gates][11] to enforce security standards on infrastructure-as-code changes before they're merged. Datadog scans the IaC changes in each pull request, identifies any vulnerabilities above your configured severity threshold, and reports a pass or fail status to GitHub or Azure DevOps.
40+
41+
By default, checks are informational, but you can make them blocking in GitHub or Azure DevOps to prevent merging when critical issues are detected. For setup instructions, see [Set up PR Gate Rules][12].
42+
3443
### View and filter findings
3544

3645
After setting up IaC Security, each commit to a scanned repository triggers a scan. Findings are summarized on the [Code Security Vulnerabilities][3] page and grouped per repository on the [Code Security Repositories][6] page.
@@ -85,4 +94,6 @@ Exclusions are managed through a configuration file or inline comments in your I
8594
[7]: /security/code_security/iac_security/exclusions/?tab=yaml
8695
[8]: /security/automation_pipelines/mute
8796
[9]: https://app.datadoghq.com/integrations/github/
88-
[10]: /security/automation_pipelines/
97+
[10]: /security/automation_pipelines/
98+
[11]: /pr_gates/
99+
[12]: /pr_gates/setup

0 commit comments

Comments
 (0)