Cette page n'est pas encore disponible en français, sa traduction est en cours.
Si vous avez des questions ou des retours sur notre projet de traduction actuel,
n'hésitez pas à nous contacter.
AAP automatically attempts to resolve http.client_ip
from several well-known headers, such as X-Forwarded-For
. If you use a custom header for this field, or want to bypass the resolution algorithm, set the DD_TRACE_CLIENT_IP_HEADER
environment variable. If this variable is set, the library only checks the specified header for the client IP.
Track authenticated bad actors
Many critical attacks are performed by authenticated users who can access your most sensitive endpoints. To identify bad actors that are generating suspicious security activity, add user information to traces by instrumenting your services with the standardized user tags. You can add custom tags to your root span, or use instrumentation functions.
The Datadog Tracing Library attempts to detect user login and signup events when compatible authentication frameworks are in use, and AAP is enabled.
Read Tracking User Activity for more information on how to manually track user activity, or see how to opt out of the automatic tracking.
Exclude specific parameters from triggering detections
There may be a time when an AAP signal, or a security trace, is a false positive. For example, AAP repeatedly detects
the same security trace and a signal is generated, but the signal has been reviewed and is not a threat.
You can add an entry to the passlist, which ignore events from a rule, to eliminate noisy signal patterns and focus on legitimately security traces.
To add a passlist entry, do one of the following:
- Click on a signal in AAP Signals and click the Add Entry link next to the Add to passlist suggested action. This method automatically adds an entry for the targeted service.
- Navigate to Passlist Configuration and manually configure a new passlist entry based on your own criteria.
Note: Requests (traces) that match a passlist entry are not billed.
Data security considerations
The data that you collect with Datadog can contain sensitive information that you want to filter out, obfuscate, scrub, filter, modify, or just not collect. Additionally, the data may contain synthetic traffic that might cause your threat detection be inaccurate, or cause Datadog to not accurately indicate the security of your services.
By default, AAP collects information from security traces to help you understand why the request was flagged as suspicious. Before sending the data, AAP scans it for patterns and keywords that indicate that the data is sensitive. If the data is deemed sensitive, it is replaced with a <redacted>
flag. This enables you to observe that although the request was suspicious, the request data was not collected because of data security concerns. User-related data, such user IDs of authenticated requests, are not part of the data being redacted.
To protect users’ data, sensitive data scanning is activated by default in AAP. You can customize the configuration by using the following environment variables. The scanning is based on the RE2 syntax. To customize scanning, set the value of these environment variables to a valid RE2 pattern:
DD_APPSEC_OBFUSCATION_PARAMETER_KEY_REGEXP
- Pattern for scanning for keys whose values commonly contain sensitive data. If found, the values and any child nodes associated with the key are redacted.DD_APPSEC_OBFUSCATION_PARAMETER_VALUE_REGEXP
- Pattern for scanning for values that could indicate sensitive data. If found, the value and all its child nodes are redacted.
For Ruby only, starting in ddtrace
version 1.1.0You can also configure scanning patterns in code:
Datadog.configure do |c|
# ...
# Set custom RE2 regexes
c.appsec.obfuscator_key_regex = '...'
c.appsec.obfuscator_value_regex = '...'
end
The following are examples of data that are flagged as sensitive by default:
pwd
, password
, ipassword
, pass_phrase
secret
key
, api_key
, private_key
, public_key
token
consumer_id
, consumer_key
, consumer_secret
sign
, signed
, signature
bearer
authorization
BEGIN PRIVATE KEY
ssh-rsa
See APM Data Security for information about other mechanisms in the Datadog Agent and libraries that can also be used to remove sensitive data.
See Automatic user activity event tracking modes for information on automatic user activity tracking modes and how to configure them. See how Datadog libraries allow you to configure auto-instrumentation by using the DD_APPSEC_AUTO_USER_INSTRUMENTATION_MODE
environment variable with the short name for the mode: ident|anon|disabled
.
Configure a custom blocking page or payload
Les requêtes bloquées incluent du contenu JSON ou HTML. Si l’en-tête HTTP Accept
pointe vers HTML, par exemple text/html
, le contenu HTML est utilisé. Dans le cas contraire, le contenu JSON est utilisé.
Les deux ensembles de contenu sont intégrés au package de la bibliothèque du traceur Datadog et chargés localement. Consultez des exemples de template pour HTML et JSON dans le code source du traceur Java de Datadog sur GitHub.
Le contenu HTML et JSON peut être modifié à l’aide des variables d’environnement DD_APPSEC_HTTP_BLOCKED_TEMPLATE_HTML
et DD_APPSEC_HTTP_BLOCKED_TEMPLATE_JSON
au sein du fichier de déploiement de votre application.
Exemple :
DD_APPSEC_HTTP_BLOCKED_TEMPLATE_HTML=<chemin_vers_fichier.html>
Si vous le souhaitez, vous pouvez également utiliser l’entrée de configuration.
Pour Java, ajoutez ce qui suit :
dd.appsec.http.blocked.template.html = '<chemin_vers_fichier.html>'
dd.appsec.http.blocked.template.json = '<chemin_vers_fichier.json>'
Pour Ruby, ajoutez ce qui suit :
# config/initializers/datadog.rb
Datadog.configure do |c|
# Pour configurer la page de blocage text/html
c.appsec.block.templates.html = '<chemin_vers_fichier.html>'
# Pour configurer la page de blocage application/json
c.appsec.block.templates.json = '<chemin_vers_fichier.json>'
end
Pour PHP, ajoutez ce qui suit :
; 98-ddtrace.ini
; Permet de personnaliser la sortie HTML fournie sur une requête bloquée
datadog.appsec.http_blocked_template_html = <chemin_vers_fichier.html>
; Permet de personnaliser la sortie JSON fournie sur une requête bloquée
datadog.appsec.http_blocked_template_json = <chemin_vers_fichier.json>
Pour Node.js, ajoutez ce qui suit :
require('dd-trace').init({
appsec: {
blockedTemplateHtml: '<chemin_vers_fichier.html>',
blockedTemplateJson: '<chemin_vers_fichier.json>'
}
})
Par défaut, voici ce à quoi ressemble une page lorsqu’une action est bloquée :
Further Reading
Documentation, liens et articles supplémentaires utiles: