Difference between revisions of "Datadog Cloud Security Management (CSM)"
Jump to navigation
Jump to search
(→Alerts) |
(→Alerts) |
||
Line 22: | Line 22: | ||
* [[Application Load Balancers should be configured to drop HTTP headers]] | * [[Application Load Balancers should be configured to drop HTTP headers]] | ||
* [[Datadog: Amazon EC2 instances should not have a public IPv4 address]] | * [[Datadog: Amazon EC2 instances should not have a public IPv4 address]] | ||
+ | * [[Datadog: Amazon ECR should be scanning all images for vulnerabilities]] | ||
== Related == | == Related == |
Revision as of 12:04, 27 June 2024
- Vulnerability management: Host Vulnerability Management, Container Vulnerability Management
- Automated compliance checks
- Continuous posture management
- Real-time threat detection
- Identity risk assessments
Activation require SecurityAudit
managed policy in DatadogAWSIntegrationRole
.
Contents
Features
- Resource Inventory (by default), require
SecurityAudit
managed policy inDatadogAWSIntegrationRole
- Case Management (by default)
- Identify Risk
- Misconfigurations
- Threat Detection
- Host Vulnerability Management
- Container Vulnerability Management
Alerts
- Datadog: EC2 subnets should not automatically assign public IP addresses
- Application Load Balancers should be configured to drop HTTP headers
- Datadog: Amazon EC2 instances should not have a public IPv4 address
- Datadog: Amazon ECR should be scanning all images for vulnerabilities
Related
- Datadog Cloud SIEM
datadog_security_monitoring_rule
datadog_cloud_workload_security_agent_rule
- CloudTrail logs
See also
- Terraform datadog, provider,
datadog_user, datadog_monitor_json, datadog_logs_custom_pipeline, datadog_integration_aws, datadog_security_monitoring_rule, datadog_integration_slack_channel, datadog_dashboard_json, datadog_logs_index
- Datadog Cloud Security Management: Identity Risk, Misconfigurations
- Datadog security: Cloud SIEM, Cloud Security Management (CSM)
Advertising: