Azure DevOps Best Practices Cheat Sheet

Step 1 of 3

Key Takeaways
  • CI/CD pipelines are a prime attack targetUnderstand why Azure DevOps pipelines are high-value targets and what attackers are actually after.
  • Lock down identity, access, and secrets by defaultLearn how to prevent IAM misconfigurations, manage PATs safely, and keep credentials out of your code.
  • Secure your pipelines from build to deploymentGet hands-on hardening steps for pipeline infrastructure, agent security, and artifact integrity.

This cheat sheet is designed for:

  • DevOps and platform engineers building or maintaining CI/CD pipelines in Azure DevOps

  • Cloud security engineers responsible for securing ADO environmentsDevelopers who want to ship fast without introducing supply chain risk

  • Compliance and GRC teams enforcing security controls across development workflows

  • Anyone looking to harden Azure DevOps against misconfigurations and credential-based attacks

What's included?

  • Control plane hardening: Organization-level settings, project governance, and branch protection policies to secure your ADO foundation.

  • Identity and access management: Best practices for Entra ID groups, JIT access, service connections, and personal access tokens.

  • Pipeline security: How to separate build and release pipelines, scope service accounts, use reusable templates, and pin task versions.

  • Secrets and credential management: Stop hardcoding credentials and use external vaults, managed identities, and automated secret rotation.

  • Threat detection and monitoring: Baseline pipeline behavior, monitor authentication patterns, and respond fast when incidents occur.

  • Continuous improvement tips: Enforce security automatically with policy as code and build an iterative security program that keeps pace with new threats.

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management