Setting up Cloud Security Management

Overview

To get started with Cloud Security Management (CSM), follow these steps:

  1. Enable Agentless Scanning
  2. Deploy the Agent for additional coverage
  3. Enable additional features

Enable Agentless Scanning

The simplest way to get started with Cloud Security Management is by enabling Agentless Scanning. Agentless Scanning provides visibility into vulnerabilities that exist within your AWS hosts, running containers, Lambda functions, and Amazon Machine Images (AMIs) without requiring you to install the Datadog Agent.

To learn more about Agentless Scanning, see Cloud Security Management Agentless Scanning.

Deploy the Agent for additional coverage

For broader coverage and additional functionalities, deploy the Datadog Agent to your hosts. The following table outlines the improvements offered by Agent-based deployments. For more information, see Setting up Cloud Security Management on the Agent.

FeatureAgentlessAgentless + Agent-based deployment
CSM Identity RisksYesYes
CSM MisconfigurationsYesYes
Host benchmarksNoYes
CSM VulnerabilitiesYesYes
Vulnerability prioritizationYesYes, with runtime context
Vulnerability update frequency12 hoursReal time
CSM ThreatsNoYes
Threat detectionNoYes
Security InboxYesYes, with more accurate insights

Enable additional features

AWS CloudTrail Logs

AWS CloudTrail Logs allows you to get the most out of CSM Identity Risks. With AWS CloudTrail Logs, you gain additional insights into the actual usage of cloud resources, helping you identify users and roles with significant gaps between provisioned and utilized permissions. For more information, see Setting up AWS CloudTrail Logs for Cloud Security Management.

IaC remediation

With Infrastructure as Code (IaC) remediation, you can use Terraform to open a pull request in GitHub, applying code changes that fix a misconfiguration or identity risk. For more information, see Setting up IaC Remediation for Cloud Security Management.

Deploy via cloud integrations

Monitor your compliance security coverage and secure your cloud infrastructure against IAM-based attacks by enabling resource scanning for AWS, Azure, and GCP resources. For more information, see Deploying Cloud Security Management via Cloud Integrations.

Further reading

PREVIEWING: alai97/reorganize-some-sections-in-dora-metrics