- 필수 기능
- 시작하기
- Glossary
- 표준 속성
- Guides
- Agent
- 통합
- 개방형텔레메트리
- 개발자
- Administrator's Guide
- API
- Datadog Mobile App
- CoScreen
- Cloudcraft
- 앱 내
- 서비스 관리
- 인프라스트럭처
- 애플리케이션 성능
- APM
- Continuous Profiler
- 스팬 시각화
- 데이터 스트림 모니터링
- 데이터 작업 모니터링
- 디지털 경험
- 소프트웨어 제공
- 보안
- AI Observability
- 로그 관리
- 관리
",t};e.buildCustomizationMenuUi=t;function n(e){let t='
",t}function s(e){let n=e.filter.currentValue||e.filter.defaultValue,t='${e.filter.label}
`,e.filter.options.forEach(s=>{let o=s.id===n;t+=``}),t+="${e.filter.label}
`,t+=`Datadog Security supports enriching and searching traces with threat intelligence indicators of compromise stored in Datadog reference tables. Reference Tables allow you to combine metadata with information already in Datadog.
Threat intelligence is supported in the CSV format and requires the following columns:
CSV Structure
field | data | description | required | example |
---|---|---|---|---|
ip_address | text | The primary key for the reference table in the IPv4 dot notation format. | true | 192.0.2.1 |
additional_data | json | Additional data to enrich the trace. | false | {"ref":"hxxp://example.org"} |
category | text | The threat intel category. This is used by some out of the box detection rules. | true | residential_proxy |
intention | text | The threat intel intent. This is used by some out of the box detection rules. | true | malicious |
source | text | The name of the source and the link to its site, such as your team and your teams wiki. | true | {"name":"internal_security_team", "url":"https://teamwiki.example.org"} |
The full list of supported categories and intents is available at Threat Intelligence Facets.
ip_address,additional_data,category,intention,source
192.0.2.1,"{""ref"":""hxxp://example.org""}",scanner,suspicious,"{""name"":""internal_security_team"", ""url"":""https://teamwiki.example.org""}"
192.0.2.2,"{""ref"":""hxxp://example.org""}",scanner,suspicious,"{""name"":""internal_security_team"", ""url"":""https://teamwiki.example.org""}"
192.0.2.3,"{""ref"":""hxxp://example.org""}",scanner,suspicious,"{""name"":""internal_security_team"", ""url"":""https://teamwiki.example.org""}"
Datadog supports creating reference tables through a manual upload, or by periodically retrieving the data from Amazon S3, Azure storage, or Google Cloud storage.
Notes:
On a new references table page:
Name the table. The table name is referenced in AAP’s Threat Intel config.
Upload a local CSV or import a CSV from a cloud storage bucket. The file is normalized and validated.
Preview the table schema and choose the IP address as the Primary Key.
Save the table.
In Threat Intel, locate the new table, and then select the toggle to enable it.
When the reference table is created from cloud storage, it is refreshed periodically. The entire table is replaced. Data is not merged.
See the related reference table documentation for:
If the reference tables are not refreshing, select the View Change Events link from the settings on the reference table detail page.
View Change Events opens a page in Event Management showing potential error events for the ingestion. You can also filter in Event Management using the reference table name.
Other useful cloud import details to remember:
You can filter AAP traces in Datadog by joining a trace table with a Reference Table.
To join a Reference Table with a trace query, you combine rows from the Datadog trace table and a Reference Table based on a related column between them. The traces query returns only those traces where there is a match in both tables.
Using a join with a Reference Table enables you to evaluate impact before enrichment by searching for historical matches with existing traces.
You can use any fields, not just IP addresses. For example, by associating security traces with specific URLs from a reference table, you can identify which parts of your application are being targeted by attacks. This can help pinpoint vulnerabilities or high-risk areas within the application.
Examples:
To join a trace with a Reference Table:
Enriching traces includes the threat intelligence attributes in AAP traces when the indicator of compromise matches the value of the http.client_ip
key in the AAP trace. This enables searching for traces with threat intelligence matches using existing facets and using threat intelligence with detection rules.