- 필수 기능
- 시작하기
- Glossary
- 표준 속성
- Guides
- Agent
- 통합
- 개방형텔레메트리
- 개발자
- API
- Datadog Mobile App
- CoScreen
- Cloudcraft
- 앱 내
- 서비스 관리
- 인프라스트럭처
- 애플리케이션 성능
- APM
- Continuous Profiler
- 스팬 시각화
- 데이터 스트림 모니터링
- 데이터 작업 모니터링
- 디지털 경험
- 소프트웨어 제공
- 보안
- AI Observability
- 로그 관리
- 관리
This topic describes threat intelligence for Application Security Management (ASM).
Datadog provides built-in threat intelligence datasets for ASM. This provides additional evidence when acting on security activity and reduces detection thresholds for some business logic detections.
Additionally, ASM supports bring your own threat intelligence. This functionality enriches detections with business-specific threat intelligence.
Datadog recommends the following methods for consuming threat intelligence:
Datadog recommends against the following:
Users can filter threat intelligence on the Signals and Traces explorers using facets and the search bar.
To search for all traces flagged by a specific source, use the following query with the source name:
@threat_intel.results.source.name:<SOURCE_NAME>
To query for all traces containing threat intelligence from any source, use the following query:
@appsec.threat_intel:true
ASM supports enriching and searching traces with threat intelligence indicators of compromise stored in Datadog reference tables. Reference Tables allow you to combine metadata with information already in Datadog.
Threat intelligence is supported in the CSV format and requires 4 columns.
CSV Structure
field | data | description | required | example |
---|---|---|---|---|
ip_address | text | The primary key for the reference table in the IPv4 dot notation format. | true | 192.0.2.1 |
additional_data | json | Additional data to enrich the trace. | false | {"ref":"hxxp://example.org"} |
category | text | The threat intel category. This is used by some out of the box detection rules. | true | residential_proxy |
intention | text | The threat intel intent. This is used by some out of the box detection rules. | true | malicious |
source | text | The name of the source and the link to its site, such as your team and your teams wiki. | true | {"name":"internal_security_team", "url":"https://teamwiki.example.org"} |
The full list of supported categories and intents is available at Threat Intelligence Facets.
ip_address,additional_data,category,intention,source
192.0.2.1,"{""ref"":""hxxp://example.org""}",scanner,suspicious,"{""name"":""internal_security_team"", ""url"":""https://teamwiki.example.org""}"
192.0.2.2,"{""ref"":""hxxp://example.org""}",scanner,suspicious,"{""name"":""internal_security_team"", ""url"":""https://teamwiki.example.org""}"
192.0.2.3,"{""ref"":""hxxp://example.org""}",scanner,suspicious,"{""name"":""internal_security_team"", ""url"":""https://teamwiki.example.org""}"
On a new references table page:
Name the table. The table name is referenced in ASM’s Threat Intel config.
Upload a CSV.
Preview the table schema and choose the IP address as the Primary Key.
Save the table.
In Threat Intel, locate the new table, and then select the toggle to enable it.
You can filter ASM traces in Datadog by joining a trace table with a Reference Table.
To join a Reference Table with a trace query, you combine rows from the Datadog trace table and a Reference Table based on a related column between them. The traces query returns only those traces where there is a match in both tables.
Using a join with a Reference Table enables you to evaluate impact before enrichment by searching for historical matches with existing traces.
You can use any fields, not just IP addresses. For example, by associating security traces with specific URLs from a reference table, you can identify which parts of your application are being targeted by attacks. This can help pinpoint vulnerabilities or high-risk areas within the application.
Examples:
To join a trace with a Reference Table:
Enriching traces includes the threat intelligence attributes in ASM traces when the indicator of compromise matches the value of the http.client_ip
key in the ASM trace. This enables searching for traces with threat intelligence matches using existing facets and using threat intelligence with detection rules.
When viewing the traces in the ASM Traces Explorer, you can see threat intelligence data under the @appsec
attribute. The category
and security_activity
attributes are both set.
Under @threat_intel.results
you can always see the full details of what was matched from which source: