Setting up Cloud Security Management

이 페이지는 아직 한국어로 제공되지 않으며 번역 작업 중입니다. 번역에 관한 질문이나 의견이 있으시면 언제든지 저희에게 연락해 주십시오.

Datadog provides a guided workflow for setting up Cloud Security Management (CSM). The first step is to select the features you want to enable. After that, follow the instructions provided to configure the selected features.

The following instructions apply to new CSM users only. If you're an existing user and would like to enable additional CSM features, see Enable additional features.
  1. On the Intro to Cloud Security Management page, click Get Started with Cloud Security Management.
  2. On the Features page, select the features you want to enable.
  3. Click Start Using Cloud Security Management and confirm your selections.
CSM Features page

After you confirm your selections, the Setup page appears. The instructions on the page are customized to match the features you selected. For example, if you enable Misconfigurations, only the Cloud Accounts and Hosts and Containers sections are displayed.

The following table shows which sections appear on the Setup page for each feature.

FeatureSetup page
Misconfigurations
Threat Detection
Identity Risks (CIEM)
*Requires Misconfigurations
Vulnerability Management
AWS CloudTrail Logs
*Requires Cloud SIEM
For instructions on setting up Agentless Scanning, see Setting up CSM Agentless Scanning.
Collecting events using Cloud Security Management will affect your billing. For more information, see Datadog Pricing.

Enable additional features

You can enable additional CSM features at any time by returning to the Features page and clicking Enable for the features you want to add. This page also serves as a status page that indicates which features are enabled, which features are enabled but not yet configured, and which features are not enabled.

CSM Features page

Further reading

PREVIEWING: esther/docs-8632-slo-blog-links