Setting up Cloud Security

Overview

To get started with Cloud Security, review the following:

Enable Agentless Scanning

The simplest way to get started with Cloud Security is by enabling Agentless Scanning. Agentless Scanning provides visibility into vulnerabilities that exist within your AWS hosts, running containers, Lambda functions, and running Amazon Machine Images (AMIs) without requiring you to install the Datadog Agent.

To learn more about Agentless Scanning, see Cloud Security Agentless Scanning.

Deploy the Agent for additional coverage

For broader coverage and additional functionalities, deploy the Datadog Agent to your hosts. The following table outlines the improvements offered by Agent-based deployments. For more information, see Setting up Cloud Security on the Agent.

FeatureAgentlessAgentless + Agent-based deploymentAgent-based deployment
Cloud Security Identity Risks
Cloud Security Misconfigurations
Host benchmarks
Cloud Security Vulnerabilities
Vulnerability prioritization
With runtime context

With runtime context
Vulnerability update frequency12 hoursReal timeReal time
Workload Protection
Threat detection
Security Inbox
With more accurate insights

With more accurate insights

Enable additional features

AWS CloudTrail Logs

Maximize the benefits of Cloud Security Identity Risks with AWS CloudTrail Logs. Gain deeper insights into cloud resource usage, identifying users and roles with significant gaps between provisioned and utilized permissions. For more information, check out Setting up AWS CloudTrail Logs for Cloud Security.

IaC scanning

Integrate Infrastructure as Code (IaC) scanning with GitHub to detect misconfigurations in Terraform-defined cloud resources. For more information, see Setting up IaC Scanning for Cloud Security.

IaC remediation

Use IaC remediation with Terraform to create pull requests in GitHub, applying code changes that fix misconfigurations and mitigate identity risks. For more information, see Setting up IaC Remediation for Cloud Security.

Deploy via cloud integrations

Monitor your compliance security coverage and secure your cloud infrastructure against IAM-based attacks by enabling resource scanning for AWS, Azure, and GCP resources. For more information, see Deploying Cloud Security via Cloud Integrations.

Disable Cloud Security

For information on disabling Cloud Security, see the following:

Further reading

PREVIEWING: janine.chan/docs-10577-cloud-security-nav-updates