Cette page n'est pas encore disponible en français, sa traduction est en cours.
Si vous avez des questions ou des retours sur notre projet de traduction actuel, n'hésitez pas à nous contacter.
Join the Preview!

Static Infrastructure as Code (IaC) scanning is in Preview. To request access, complete the form.

Request Access

Infrastructure as Code (IaC) scanning in Datadog automatically analyzes your Terraform files for security misconfigurations. Findings appear in the Code Security Vulnerabilities tab, where you can group, filter, and triage issues by severity, status, and more. For each finding, Datadog provides detailed remediation guidance, code diffs, and the ability to open a pull request or commit fixes directly from the UI.

Static IaC scanning supports GitHub for version control and Terraform for infrastructure as code.
Cloud Security Findings page displaying detected misconfigurations in cloud resources

When you click on a finding, the side panel reveals additional details, including a short description of the IaC rule related to the finding and a preview of the offending code.

Finding side panel highlighting undefined EBS volume encryption in Terraform code.

Key capabilities

  • Scan Terraform files for security misconfigurations
  • Surface IaC misconfigurations in the Code Security Vulnerabilities tab
  • Group and filter findings by severity, triage status, and other facets
  • View detailed remediation guidance and code diffs for each finding
  • Open a pull request or commit fixes directly from the UI
  • Track finding status and history for triage and resolution
  • Configure scanning exclusions

Getting started

  1. Set up IaC scanning in your environment
  2. Configure scanning exclusions if needed
  3. Review and triage findings in the Code Security Vulnerabilities tab

Further reading

Documentation, liens et articles supplémentaires utiles:

PREVIEWING: deforest/docs-11221-move-iac-to-code-security