---
title: "Cloud security research and guide roundup: DevSecOps, threat detection, and AI"
description: "Learn how Datadog's research and contributions in the areas of DevSecOps, threat detection, and AI help you secure your cloud-based applications."
author: "Mallory Mooney"
date: 2025-01-29
tags: ["security", "threat detection", "ai", "devsecops"]
blog_type_id: the-monitor
locale: en
---

In [Part 1](https://www.datadoghq.com/blog/cloud-security-roundup-infrastructure-identity.md) of our cloud security research and guide roundup, we looked at our contributions to helping you manage cloud infrastructure, data, identities, and access. In Part 2, we share our research, insights, and guides from Datadog [Security Labs](https://securitylabs.datadoghq.com/) and [The Monitor](https://www.datadoghq.com/blog/tag/security.md) that support the NSA's cloud mitigation strategies in the following areas:

- [DevSecOps practices](#devsecops-practices): Integrate security into existing DevOps workflows
- [Threat detection and response](#threat-detection-and-response): Proactively detect vulnerabilities in the cloud

We'll also go beyond these common strategies to look at how security plays a role in [working with LLMs](#beyond-the-recommendations-ai-security).

## DevSecOps practices

With the migration to the cloud, many organizations are integrating security into their existing development and operations workflows, creating a new DevSecOps discipline. The NSA's list includes two key strategies for adopting a DevSecOps approach: [defending CI/CD environments](https://media.defense.gov/2023/Jun/28/2003249466/-1/-1/0/CSI_DEFENDING_CI_CD_ENVIRONMENTS.PDF) and [using Infrastructure as Code (IaC) to secure deployments](https://media.defense.gov/2024/Mar/07/2003407857/-1/-1/0/CSI-CloudTop10-Infrastructure-as-Code.PDF). Even with these recommendations, there are still challenges with maintaining secure code, pipelines, and deployments, which we've identified in our [State of DevSecOps Report](https://www.datadoghq.com/state-of-devsecops/) and [key report findings](https://www.datadoghq.com/blog/devsecops-2024-study-learnings.md).

### Guides

Because of the challenges associated with integrating security with DevOps, we want to help organizations move in that direction. For example, we've developed a tool for [assessing your organization's DevSecOps maturity](https://www.datadoghq.com/blog/devsecops-maturity-model-self-assessment.md). We've also taken steps to adopt a [DevSecOps approach](https://www.datadoghq.com/blog/datadogs-approach-devsecops.md) at Datadog and have written several posts on managing the various aspects of it, such as securing code, CI/CD pipelines, and infrastructure:

- [Using Datadog for Detection as Code](https://www.datadoghq.com/blog/datadog-detection-as-code.md)
- [Managing an inventory of software components (i.e., Software Bill of Materials)](https://www.datadoghq.com/blog/enhance-sboms-application-vulnerability-management.md)
- [Using threat models to secure systems](https://www.datadoghq.com/blog/threat-modeling-datadog-application-security-management.md)
- [Creating security-focused chaos engineering experiments](https://www.datadoghq.com/blog/chaos-engineering-for-security.md)
- [Detecting emerging vulnerabilities](https://www.datadoghq.com/blog/detecting-and-evaluating-emerging-vulnerabilities.md)

## Threat detection and response

Considering the size and complexity of cloud environments, it's challenging to get adequate visibility into activity. As mentioned in the NSA's strategy list, [cloud authentication, audit, and activity logs](https://media.defense.gov/2024/Mar/07/2003407864/-1/-1/0/CSI_CloudTop10-Logs-for-Effective-Threat-Hunting.PDF) provide a "source of truth" for threat detection. But even if you collect the appropriate logs, it's difficult to fine-tune them to filter out the noise and surface legitimate threats.

### Research

We've dedicated a significant amount of time researching ways to strengthen threat detection as well as discovering common threats and exploits in various cloud environments:

- [Datadog threat roundup: top insights for Q4 2024](https://securitylabs.datadoghq.com/articles/2024-q4-threat-roundup/)
- [An Adventure in Google Cloud threat detection](https://securitylabs.datadoghq.com/articles/google-cloud-threat-detection/)
- [Following attackers’ (Cloud)trail in AWS: Methodology and findings in the wild](https://securitylabs.datadoghq.com/articles/following-attackers-trail-in-aws-methodology-findings-in-the-wild/)
- [Tales from the cloud trenches: Using AWS CloudTrail to identify malicious activity and spot phishing campaigns](https://securitylabs.datadoghq.com/articles/tales-from-the-cloud-trenches-aws-activity-to-phishing/)
- [Bypassing CloudTrail in AWS Service Catalog, and other logging research](https://securitylabs.datadoghq.com/articles/bypass-cloudtrail-aws-service-catalog-and-other/)

To take it a step further, we've shown how to [emulate threats in AWS environments](https://datadoghq.com/blog/aws-threat-emulation-detection-validation-datadog/) and [test detections for your container workloads](https://www.datadoghq.com/blog/workload-security-evaluator.md) to ensure the resilience of your threat detection strategies.

### Guides

We've also written several posts about collecting and interpreting authentication, audit, and activity logs, including:

- [Firewall logs](https://www.datadoghq.com/blog/monitoring-firewall-logs-datadog.md)
- [Azure platform logs](https://www.datadoghq.com/blog/monitoring-azure-platform-logs.md)
- [Key Kubernetes audit logs](https://www.datadoghq.com/blog/key-kubernetes-audit-logs-for-monitoring-cluster-security.md)
- [Authentication logs](https://www.datadoghq.com/blog/how-to-monitor-authentication-logs.md)
- [AWS CloudTrail logs](https://www.datadoghq.com/blog/monitoring-cloudtrail-logs.md)
- [Google Cloud audit logs](https://www.datadoghq.com/blog/monitoring-gcp-audit-logs.md)
- [Windows Event logs](https://www.datadoghq.com/blog/monitor-windows-event-logs-with-datadog.md)

Your logs are the foundation for efficient threat detection, but understanding how to turn those logs into valuable signals for cloud SIEMs can be challenging given the volume of logs that a cloud environment can generate. We've walked through how you can [build sufficient security coverage](https://www.datadoghq.com/blog/building-security-coverage-for-cloud-environments.md) and ensure that your [cloud SIEMs are generating accurate, relevant signals](https://www.datadoghq.com/blog/writing-datadog-security-detection-rules.md).

These strategies can strengthen threat detection for your organization and ensure that you are generating valuable cloud SIEM signals for your cloud environment and its components.

## Beyond the recommendations: AI security

In addition to addressing the common strategies for cloud security, we've also looked at where security plays a role in emergent technologies, like AI. For example, in our latest [threat finding roundup](https://securitylabs.datadoghq.com/articles/2024-q4-threat-roundup/), our security researchers noted an [increase in the number of attempts to target Amazon Bedrock applications](https://securitylabs.datadoghq.com/articles/2024-q4-threat-roundup/#threat-actors-target-cloud-ai-environments).

### Guides

This finding highlights the need for understanding how LLMs operate and where they are susceptible to attacks, which we've addressed in the following posts:

- [Monitor LLM prompt injection attack](https://www.datadoghq.com/blog/monitor-llm-prompt-injection-attacks.md)
- [Troubleshooting RAG-based LLMs](https://www.datadoghq.com/blog/troubleshooting-rag-llms.md)
- [Machine learning model monitoring: best practices](https://www.datadoghq.com/blog/ml-model-monitoring-in-production-best-practices.md)
- [Instrument LLM chains](https://www.datadoghq.com/blog/llm-observability-chain-tracing.md)

As teams become more familiar with how to efficiently monitor LLM applications, they can better prepare for misconfigurations that can lead to vulnerabilities and threats.

## Secure your cloud environments with Datadog

In this post, we shared our research, expertise, and insights in several key areas of cloud security, which can help you adhere to the commonly shared strategies from sources like the NSA. To dig into our cloud security research, check out [Security Labs](https://securitylabs.datadoghq.com/), or read [our blog](https://www.datadoghq.com/blog/tag/security.md) and [documentation](https://docs.datadoghq.com/security.md) to learn how Datadog's security platform can help you monitor and secure your cloud environment. If you don't already have a Datadog account, you can sign up for a <!-- Sign-up trigger (free 14-day trial) omitted -->.