Getting Started with Cloud Security
Cette page n'est pas encore disponible en français, sa traduction est en cours.
Si vous avez des questions ou des retours sur notre projet de traduction actuel,
n'hésitez pas à nous contacter.
Overview
Datadog Cloud Security delivers deep visibility, continuous configuration audits, identity risk assessments, vulnerability detection, and real-time threat detection across your entire cloud infrastructure—all in a unified platform for seamless collaboration and faster remediation.
With Cloud Security, Security and DevOps teams can act on the shared context of observability and security data to quickly prioritize and remediate issues. This guide walks you through best practices for getting your team up and running with Cloud Security.
Phase 1: Deployment
- Using Agentless and/or the Datadog Agent (version 7.46 or above), enable Cloud Security for your cloud resources and infrastructure:
- Threats: Kubernetes, Docker, and host-based installations.
- Misconfigurations: AWS, Azure, GCP, Kubernetes, and Docker instructions.
- Identity Risks: Enable AWS resource collection and Cloudtrail logs forwarding.
- Vulnerabilities: Container image scanning and host scanning instructions for AWS, Azure, Kubernetes, ECS EC2 instances, and host-based installations.
- Check out the Cloud Security homepage to get an overview of your organization’s risks and threats.
- Review 500+ out-of-the-box Threats and Misconfigurations detection rules.
- Explore security signals and review Cloud Security Misconfigurations findings.
- Review and remediate identity risks on the Identity Risks page.
- Review container vulnerabilities on the Container Images page, and a consolidated list of vulnerabilities on the Infrastructure Vulnerability page.
- Set up notification rules and receive alerts using Slack, Jira, email, and more.
Phase 2: Customization
- Set up Workload Protection suppression rules to reduce noise.
- Create custom detection rules for Cloud Security Misconfigurations and Workload Protection.
Phase 3: Reports and dashboards
- Assess your organization’s posture by reviewing compliance reports.
- Use out-of-the-box dashboards or create your own for faster investigations, reporting, and monitoring.
- Subscribe to the weekly security digest reports to begin investigation and remediation of the most important new security issues discovered in the last seven days.
Disable Cloud Security
For information on disabling Cloud Security, see the following:
Further reading
Documentation, liens et articles supplémentaires utiles: