The Monitor

Visualize cloud security relationships with Datadog Security Graph

4 min read

Share article

Visualize cloud security relationships with Datadog Security Graph
Jean-Claude Kuo

Jean-Claude Kuo

For developers and security engineers alike, one of the most persistent challenges in cloud security is making sense of how compute, storage, identity, and networking components interact. Traditional security tools often lack the ability to surface multi-hop access paths, making it difficult to answer questions like: "Which EC2 instances can access sensitive S3 buckets, and are any of them exposed to the internet?" Datadog Security Graph addresses this problem by modeling your cloud environment as a dynamic, relationship-aware graph. Built on data from Datadog Cloud Security, it enables you to visualize and query the real-world connections between cloud resources, helping you surface indirect access paths, assess identity risk, and respond more effectively to emerging threats.

In this post, we’ll show you how to use Datadog Security Graph to:

Identify potential attack paths within your cloud resources

Security Graph reimagines your cloud environment as a graph of nodes and relationships. Resources such as EC2 instances, IAM roles, S3 buckets, and security groups are represented as nodes, while access relationships, trust relationships, and network exposure are modeled as edges. This approach has several advantages:

  • It captures both direct and transitive relationships, such as a role assuming another role that has access to a resource.
  • It enables you to spot indirect access paths and risk exposure that would otherwise remain hidden in IAM policies or configuration files.
  • It reflects how attackers think, identifying possible pivot points between resources.
  • It gives security teams a complete, contextual view of risk across their cloud environments.

While piecing together relationships across your cloud resources manually would be time-consuming and error-prone with traditional inventory tools, Security Graph combines data from Agentless and Agent-based cloud scanning to offer a detailed view of these relationships. It includes several features that help teams investigate and respond to risk:

  • Prebuilt queries for common security questions, such as, “Which publicly accessible EC2 instances have administrative IAM roles?”
  • A no-code query builder to help you dive deeper and find potentially risky relationships among your cloud resources
  • Interactive visualizations that let you explore cloud resource graphs and view metadata, tags, and linked security findings
  • A tabular view for analyzing and exporting results at scale

For example, let’s say you’re trying to find any publicly accessible EC2 instances that can access S3 buckets containing sensitive data. This type of investigation requires analyzing a multi-hop path that might look like this:

  1. A public EC2 instance is associated with an instance profile.
  2. That instance profile is bound to IAM Role A.
  3. IAM Role A has a policy that allows it to assume IAM Role B using sts:AssumeRole.
  4. IAM Role B has a permission policy that grants access to specific S3 buckets (e.g., s3:GetObject, s3:ListBucket).

Security Graph makes this entire access chain visible and queryable, enabling you to visualize the exact kinds of resources and paths you’re looking for.

See relationships across your cloud resources in Datadog Security Graph
See relationships across your cloud resources in Datadog Security Graph

This visualization reveals not just whether access exists, but how it’s granted, enabling teams to assess whether those paths are expected, misconfigured, or overly permissive. With this information in hand, you can remediate any resources where these configurations are unwanted or excessive, limiting your infrastructure’s risk exposure.

Analyze identity policies with Access Insights

Security Graph also powers Access Insights, which calculates effective permissions for any identity or resource by analyzing:

  • Direct policies (inline, AWS-managed, customer-managed)
  • Indirect policies (assumed roles, group memberships)
  • Resource-based permissions (service control policies, permission boundaries)

When you select a resource in the Security Graph, you’ll bring up a detailed side panel that includes these insights. This data helps you answer questions such as:

  • What can this EC2 instance access?
  • Which roles or users can read from this S3 bucket?
Access Insights in Datadog Security Graph
Access Insights in Datadog Security Graph

By surfacing both explicit and transitive access paths, Access Insights helps you right-size IAM policies and reduce the potential for lateral movement.

Understand cloud risks holistically with Security Graph

Datadog Security Graph provides security and DevOps teams a real-time, relationship-based view of risks across their infrastructure, so they can:

  • Accelerate investigations: Visually trace access paths in seconds instead of reviewing IAM policies line-by-line.
  • Analyze blast radius: Understand the downstream effects of a compromised identity or misconfigured policy.
  • Perform proactive security reviews: Identify and remediate risky access paths before they reach production.

By modeling access the way attackers do—through connected paths rather than isolated nodes—Security Graph helps everyone make more informed decisions about infrastructure risk.

Datadog Security Graph is currently in preview and available to customers who use Datadog Cloud Security. Sign up for the preview and check out our documentation to get started. If you’re not yet using Datadog, you can sign up for a .

Related Articles

Add security context to observability data with Datadog Cloud Security Management

Add security context to observability data with Datadog Cloud Security Management

Datadog Security extends compliance and threat protection capabilities for Google Cloud

Datadog Security extends compliance and threat protection capabilities for Google Cloud

Customize rules for detecting cloud misconfigurations with Datadog Cloud Security Management

Customize rules for detecting cloud misconfigurations with Datadog Cloud Security Management

Improve the compliance and security posture of your Google Cloud environment with Datadog

Improve the compliance and security posture of your Google Cloud environment with Datadog

Start monitoring your metrics in minutes