Cloud Security Management Agentless Scanning

このページは日本語には対応しておりません。随時翻訳に取り組んでいます。翻訳に関してご質問やご意見ございましたら、お気軽にご連絡ください。

Agentless Scanning for Cloud Security Management is not supported for your selected Datadog site ().

Overview

Agentless Scanning provides visibility into vulnerabilities that exist within your AWS hosts, running containers, Lambda functions, and Amazon Machine Images (AMIs) without requiring you to install the Datadog Agent. Datadog recommends enabling Agentless Scanning as a first step to gain complete visibility into your cloud resources, and then installing the Datadog Agent on your core assets over time for deeper security and observability context.

Availability

The following table provides a summary of Agentless scanning technologies in relation to their corresponding components:

ComponentSupported technology
Cloud ProviderAWS
Operating SystemLinux
Host FilesystemBtrfs, Ext2, Ext3, Ext4, xfs
Package ManagerDeb (debian, ubuntu)
RPM (amazon-linux, fedora, redhat, centos)
APK (alpine)
EncryptionAWS
Unencrypted
Encrypted - Platform Managed Key (PMK)
Note: Encrypted - Customer Managed Key (CMK) is not supported
Container runtimeDocker, containerd
Note: CRI-O is not supported
ServerlessAWS, AWS Lambda
Serverless languages.Net, Python, Java, Ruby, Node.js, Go

How it works

After setting up Agentless scanning for your resources, Datadog schedules automated scans in 12-hour intervals through Remote Configuration. During a scan cycle, Agentless scanners gather Lambda code dependencies and create snapshots of your EC2 instances. With these snapshots, the Agentless scanners scan, generate, and transmit a list of packages to Datadog to check for vulnerabilities, along with Lambda code dependencies. When scans of a snapshot are completed, the snapshot is deleted. No confidential or private personal information is ever transmitted outside of your infrastructure.

The following diagram illustrates how Agentless Scanning works:

Diagram showing how Agentless scanning works
  1. Datadog schedules a scan and sends which resources to scan through Remote Configuration.

    Note: Scheduled scans ignore hosts that already have the Datadog Agent installed with Cloud Security Management enabled. Datadog schedules a continuous re-scanning of resources every 12 hours to provide up-to-date insights into potential vulnerabilities and weaknesses.

  2. For Lambda functions, the scanners fetch the function’s code.

  3. The scanner creates snapshots of EBS volumes used by EC2 instances. These snapshots serve as the basis for conducting scans. Using the snapshots, or the code, the scanner generates a list of packages.

  4. After the scan is complete, the list of packages and information related to collected hosts (hostnames/EC2 instances) are transmitted to Datadog, with all other data remaining within your infrastructure. Snapshots created during the scan cycle are deleted.

  5. Leveraging the collected package list along with Datadog’s access to the Trivy vulnerabilities database, Datadog finds matching affected vulnerabilities in your resources and code.

Notes:

  • The scanner operates as a separate EC2 instance within your infrastructure, ensuring minimal impact on existing systems and resources.
  • The scanner securely collects a list of packages from your hosts without transmitting any confidential or private personal information outside your infrastructure.
  • The scanner limits its use of the AWS API to prevent reaching the AWS rate limit, and uses exponential backoff if needed.

What data is sent to Datadog

The Agentless scanner uses the OWASP cycloneDX format to transmit a list of packages to Datadog. No confidential or private personal information is ever transmitted outside of your infrastructure.

Datadog does not send:

  • System and package configurations
  • Encryption keys and certificates
  • Logs and Audit Trails
  • Sensitive business data

Security considerations

Because the scanner instances grant permissions to create and copy EBS snapshots, and describe volumes, Datadog advises restricting access to these instances solely to administrative users.

To further mitigate this risk, Datadog implements the following security measures:

  • The Datadog scanner operates within your infrastructure, ensuring that all data, including snapshots and list of packages, remain isolated and secure.
  • All data transmission between the scanner and Datadog is encrypted using industry standard protocols (such as HTTPS) to ensure data confidentiality and integrity.
  • The Datadog scanner operates under the principle of least privilege. This means that it is granted only the minimum permissions necessary to perform its intended functions effectively.
  • Datadog carefully reviews and limits the permissions granted to the scanner to ensure that it can conduct scans without unnecessary access to sensitive data or resources.
  • Unattended security updates are enabled on Datadog’s scanner instances. This feature automates the process of installing critical security patches and updates without requiring manual intervention.
  • The Datadog scanner instances are automatically rotated every 24 hours. This rotation ensures that the scanner instances are continually updated with the latest Ubuntu Amazon Machine Images (AMIs).
  • Access to the scanner instances is tightly controlled through the use of security groups. No inbound access to the scanner is allowed, restricting possibility to compromise the instance.
  • No confidential or private personal information is ever transmitted outside of your infrastructure.

Agentless Scanning with existing Agent installations

When installed, the Datadog Agent offers real-time, deep visibility into risks and vulnerabilities that exist in your cloud workloads. It is recommended to fully install the Datadog Agent.

As a result, Agentless Scanning excludes resources from its scans that have the Datadog Agent installed and configured for Vulnerability Management. In this way, Cloud Security Management offers complete visibility of your risk landscape without overriding the benefits received from installing the Datadog Agent with Vulnerability Management.

The following diagram illustrates how Agentless scanning works with existing Agent installations:

Diagram showing how Agentless scanning works when the Agent is already installed with CSM vulnerability management

Cloud Storage scanning

Join the Preview!

Scanning support for Amazon S3 buckets and RDS instances is in Preview. To enroll, click Request Access.

Request Access

If you have Sensitive Data Scanner enabled, you can catalog and classify sensitive data in your Amazon S3 buckets and RDS instances.

Sensitive Data Scanner scans for sensitive data by deploying Agentless scanners in your cloud environments. These scanning instances retrieve a list of all S3 buckets and RDS instances through Remote Configuration, and have set instructions to scan text files—such as CSVs and JSONs—and tables in every datastore over time. Sensitive Data Scanner leverages its entire rules library to find matches. When a match is found, the location of the match is sent to Datadog by the scanning instance. Data stores and their files are only read in your environment—no sensitive data is sent back to Datadog.

Along with displaying sensitive data matches, Sensitive Data Scanner surfaces any security issues detected by Cloud Security Management affecting the sensitive datastores. You can click any issue to continue triage and remediation within Cloud Security Management.

Cloud service provider cost

When using Agentless Scanning, there are additional costs for running scanners in your cloud environments. To optimize on costs while being able to reliably scan every 12 hours, Datadog recommends setting up Agentless Scanning with Terraform as the default template, as this also avoids cross-region networking.

To establish estimates on scanner costs, reach out to your Datadog Customer Success Manager.

Further reading

PREVIEWING: antoine.dussault/service-representation-ga-docs-us1