- 필수 기능
- 시작하기
- Glossary
- 표준 속성
- Guides
- Agent
- 통합
- 개방형텔레메트리
- 개발자
- API
- Datadog Mobile App
- CoScreen
- Cloudcraft
- 앱 내
- 서비스 관리
- 인프라스트럭처
- 애플리케이션 성능
- APM
- Continuous Profiler
- 스팬 시각화
- 데이터 스트림 모니터링
- 데이터 작업 모니터링
- 디지털 경험
- 소프트웨어 제공
- 보안
- AI Observability
- 로그 관리
- 관리
Datadog’s Safety Center in Organization Settings is a centralized location for security alerts and best practices. Administrators of an organization can open this page to review recommendations and take action on high priority security warnings and alerts.
If your organization has a high priority security alert, it appears in the Security Alerts section of Safety Center. Safety Center supports two types of alerts: leaked application keys and leaked API keys.
A leaked key alert means that one or more private keys (application or API) have been compromised or publicly exposed on the internet. Exposed keys have to be revoked as soon as possible to minimize security risks to your organization. Removing the file containing the key from a public site such as GitHub does not guarantee it was not already accessed by another party.
The Configuration tab in Safety Center allows setting Security Contacts - primary and secondary email addresses to receive security notifications for your Datadog organization. Upon detecting security issues, like publicly exposed Datadog keys needing rotation, your assigned Security Contacts gets notified.
It is important to keep Security Contacts up to date to ensure that potential security risks are promptly addressed and mitigated. The Safety Center page reminds you to review assigned Security Contacts every 6 months.
The Access & Sharing section in Safety Center lists entities that allow external access to your Datadog organization. It highlights:
Inactive OAuth applications can pose a potential security risk to your organization if compromised. They should be reviewed regularly and those applications that are no longer in use should be disabled.
Unused API keys can facilitate unauthorized access to your organization if they become exposed on the internet. Unused keys need to be reviewed and revoked if your organization’s infrastructure does not rely on them.
In order to keep your organization safe it is important to follow best practices for user management. The Users page in Safety Center surfaces user-related security recommendations:
Having inactive user accounts or stale pending user invites increases the surface for a potential account takeover attack. That can be especially dangerous if inactive user accounts have high-privilege access. To keep the number of inactive users to a minimum consider either resending old pending invites or deleting them if those users do not need access to the Datadog platform.
Giving admin access to users without careful consideration increases potential security risks in the event where a user account with elevated privileges gets compromised. To keep the number of users with admin access low, review your admin users regularly and revoke admin privileges if users do not require them.