Setting up Cloud Security Management
Datadog provides a guided workflow for setting up Cloud Security Management (CSM). The first step is to select the features you want to enable. After that, follow the instructions provided to configure the selected features.
The following instructions apply to new CSM users only. If you're an existing user and would like to enable additional CSM features, see
Enable additional features.
- On the Intro to Cloud Security Management page, click Get Started with Cloud Security Management.
- On the Features page, select the features you want to enable.
- Click Start Using Cloud Security Management and confirm your selections.
After you confirm your selections, the Setup page appears. The instructions on the page are customized to match the features you selected. For example, if you enable Misconfigurations, only the Cloud Accounts and Hosts and Containers sections are displayed.
The following table shows which sections appear on the Setup page for each feature.
Feature | Setup page |
---|
Misconfigurations | |
Threat Detection | |
Identity Risks (CIEM) *Requires Misconfigurations | |
Vulnerability Management | |
AWS CloudTrail Logs *Requires Cloud SIEM | |
Collecting events using Cloud Security Management will affect your billing. For more information, see
Datadog Pricing.
Enable additional features
You can enable additional CSM features at any time by returning to the Features page and clicking Enable for the features you want to add. This page also serves as a status page that indicates which features are enabled, which features are enabled but not yet configured, and which features are not enabled.
Further reading
Additional helpful documentation, links, and articles: