Datadog Cloud Security Management

Unified view of infra threats & findings

Vulnerability Management

- Detect, prioritize, and manage vulnerabilities in your organization’s containers and hosts.
- Prioritize cloud vulnerabilities based on potential business impact, real-time observability context, and Datadog’s curated security research.
- Streamline collaboration between security and DevOps teams by providing shared visibility across infrastructure monitoring and security views.

Cloud Security Posture Management (CSPM)

- Run continuous configuration checks across your cloud accounts, hosts, and containers to assess your security posture.
- Track conformance to requirements of industry benchmarks and other controls, such as CIS, PCI DSS, SOC 2, and more, with flexible customization options.
- Improve collaboration and resolution times of misconfigurations by automatically routing alerts to the right teams and quickly accessing resource ownership, configuration, and remediation steps.

Cloud Workload Security (CWPP)

- Get kernel-level visibility into workload activity across your hosts and containers to uncover threats.
- Use curated out-of-the-box workload threat detection rules researched, developed, and maintained by Datadog security research.
- Detect unknown threats and anomalous process, network, or file activity using workload behavior modeling.
- Maintain critical file controls and detect problems in real-time with Datadog File Integrity Monitoring (FIM).

Cloud Infrastructure Entitlement Management (CIEM)

- Secure your cloud infrastructure from IAM-based attacks by mitigating excessive permissions gaps, controlling administrative privileges, and reducing the potential blast radius of security incidents.
- Access full summaries of detected identity risks, including how resources can be accessed, related permissions, and remediation steps for efficient mitigation.
- Proactively defend against evolving identity risks with curated rules and best practices, continually updated by Datadog’s security research.

Security Inbox

- Prioritize vulnerabilities, misconfigurations, identity risks, and other signals in one actionable place based on the severity of impact on your security posture.
- Automatically correlate observability and security data to identify top issues across security threats, misconfigurations, vulnerabilities, and other detections.
- Assess the blast radius and probability of resource exploitation with relationship graphs that visualize interdependencies within your cloud environment.