diff --git a/.gitlab/ci/reports.gitlab-ci.yml b/.gitlab/ci/reports.gitlab-ci.yml
index 9158e02da94031eb4b03583d460240349ff1c996..0290d0158b6cd419944255a51661dbf91d8dd2dd 100644
--- a/.gitlab/ci/reports.gitlab-ci.yml
+++ b/.gitlab/ci/reports.gitlab-ci.yml
@@ -74,13 +74,6 @@ gemnasium-dependency_scanning:
 gemnasium-python-dependency_scanning:
   rules: !reference [".reports:rules:gemnasium-python-dependency_scanning", rules]
 
-yarn-audit-dependency_scanning:
-  extends: .ds-analyzer
-  image: "${REGISTRY_HOST}/${REGISTRY_GROUP}/security-products/analyzers/npm-audit:1"
-  variables:
-    TOOL: yarn
-  rules: !reference [".reports:rules:yarn-audit-dependency_scanning", rules]
-
 # Analyze dependencies for malicious behavior
 # See https://gitlab.com/gitlab-com/gl-security/security-research/package-hunter
 .package_hunter-base:
diff --git a/.gitlab/ci/rules.gitlab-ci.yml b/.gitlab/ci/rules.gitlab-ci.yml
index 74257fbe2933a5188d8c5cf3a5f4a51e24349c0b..4c473051ff5e3358752a30747b16a7ef71e836cb 100644
--- a/.gitlab/ci/rules.gitlab-ci.yml
+++ b/.gitlab/ci/rules.gitlab-ci.yml
@@ -2313,17 +2313,6 @@
     - <<: *if-default-refs
       changes: *python-patterns
 
-.reports:rules:yarn-audit-dependency_scanning:
-  rules:
-    - <<: *if-merge-request-labels-pipeline-expedite
-      when: never
-    - if: '$DEPENDENCY_SCANNING_DISABLED || $GITLAB_FEATURES !~ /\bdependency_scanning\b/'
-      when: never
-    # Run Dependency Scanning on master until https://gitlab.com/gitlab-org/gitlab/-/issues/361657 is resolved
-    - <<: *if-default-branch-refs
-    - <<: *if-default-refs
-      changes: *nodejs-patterns
-
 .reports:rules:test-dast:
   rules:
     - <<: *if-merge-request-labels-pipeline-expedite