- 필수 기능
- 시작하기
- Glossary
- 표준 속성
- Guides
- Agent
- 통합
- 개방형텔레메트리
- 개발자
- API
- Datadog Mobile App
- CoScreen
- Cloudcraft
- 앱 내
- 서비스 관리
- 인프라스트럭처
- 애플리케이션 성능
- APM
- Continuous Profiler
- 스팬 시각화
- 데이터 스트림 모니터링
- 데이터 작업 모니터링
- 디지털 경험
- 소프트웨어 제공
- 보안
- AI Observability
- 로그 관리
- 관리
Cloud Security Management Vulnerabilities (CSM Vulnerabilities) helps you proactively secure your cloud infrastructure by detecting, prioritizing, and managing vulnerabilities across your container images and hosts. It leverages deep observability context and industry insights to help you remediate vulnerabilities that are most important to you at a given point in time.
Note: If you’re looking for vulnerability management for your application libraries and custom application code, see Software Composition Analysis.
The Vulnerabilities Explorer shows a complete list of vulnerabilities detected across your infrastructure, ordering them based on their severity, offering grouping, filtering, and triaging capabilities so you can investigate, assign, and remediate problems.
Select a specific vulnerability to see its details, including which containers and hosts are affected, severity breakdown score, and recommended remediation steps. The severity of a vulnerability is modified from the base score to take into account the following:
You can also view vulnerabilities in your container images on the container images page. Sort by source, image tag, repo digest, and more. View additional details about any vulnerability by clicking the container image and reviewing the Vulnerabilities tab.
On the details explorer, you can also view impacted resources in CSM to gain better insights to your overall risk.
All vulnerabilities include a collection of links and references to websites or information sources that help you understand the context behind each vulnerability.
The Vulnerabilities Explorer also offers triaging options for detected vulnerabilities that enable you to change the status of a vulnerability, and assign it to individual members for remediation and tracking.
Note: To help you focus on the vulnerabilities that truly matter, vulnerabilities are auto-closed for infrastructure that is either no longer running, or contains the remediated fixed version of the previously-vulnerable package.
The following video provides an overview of how to enable and use CSM Vulnerabilities:
추가 유용한 문서, 링크 및 기사: