The Monitor

From discovery to defense: Securing APIs with Datadog App and API Protection

7 minute read

Published

Share

From discovery to defense: Securing APIs with Datadog App and API Protection
Margherita Donnici

Margherita Donnici

Prachi Chouksey

Prachi Chouksey

APIs now sit at the center of almost every digital product, from mobile apps and SaaS platforms to embedded services. As organizations scale, the number of endpoints grows quickly, as does the attack surface. Unmonitored or misconfigured APIs have already led to major incidents across industries, including data exposure, broken authentication, and large-scale account takeover. These cases highlight how unknown or unmanaged APIs can leak sensitive data, introduce compliance risks, and give attackers a way in. Many of these problems start with something relatively simple: You cannot protect what you cannot see.

Datadog App and API Protection (AAP) helps you move from API visibility to concrete security outcomes. With API Inventory, API Findings, and a posture overview, AAP discovers your endpoints across environments, detects misconfigurations and sensitive data exposure, and gives teams the context they need to prioritize and remediate risk, all in the same platform they already use to monitor applications and infrastructure.

In this post, we’ll show how you can use AAP to:

Gain full visibility with API Inventory

Effective API security starts with a complete, accurate inventory of your endpoints. In most environments, that inventory is scattered across OpenAPI specs, gateway configs, source code, and whatever your HTTP logs happen to reveal. AAP’s API Inventory brings all of this together into a single, continuously updated view.

AAP automatically discovers endpoints from multiple sources, including:

  • Live traffic, to show which routes are actually in use in real time
  • Uploaded API definitions, such as OpenAPI specifications
  • Inferred routes, detected from non-instrumented traffic
  • Integrations with AWS API Gateway, to surface managed APIs across cloud environments
  • Source code analysis, which detects endpoints directly from your repositories
  • Tracer-less and edge integrations with NGINX, Envoy, HAProxy, and Google Cloud Load Balancing, so you can get instant visibility even before teams instrument code

The following diagram shows how Datadog AAP collects API metadata from multiple discovery sources and unifies them into a centralized API Inventory:

Diagram showing Datadog App and API Protection aggregating endpoints from traffic, gateways, source code, and other discovery sources into a centralized API inventory.
Diagram showing Datadog App and API Protection aggregating endpoints from traffic, gateways, source code, and other discovery sources into a centralized API inventory.

By consolidating these inputs, API Inventory gives you a unified view of your API landscape, whether or not those endpoints are documented. Each entry in the inventory is enriched with critical security context, such as:

  • Authentication methods and whether an endpoint is public-facing
  • Security findings, including potential misconfigurations, weak authentication, or sensitive data exposure
  • Usage data, including when an endpoint was last seen in traffic

This makes it straightforward to answer questions that usually require custom scripts or one-off audits, such as:

  • Which endpoints are undocumented or exposed to the internet?
  • Which APIs handle sensitive data?
  • Which endpoints have the riskiest combinations of sensitivity, exposure, and traffic?

The following screenshot of API Inventory shows how this context in a single place enables security and platform teams to align on a single source of truth for APIs instead of juggling spreadsheets, gateway configs, and code searches.

Datadog API Inventory view listing endpoints with source, service, sensitive data tags, and associated security findings.
Datadog API Inventory view listing endpoints with source, service, sensitive data tags, and associated security findings.

Detect hidden risks in your API landscape

Once your endpoints are discovered, the next step is understanding which ones are risky, unused, or under active attack. API Inventory includes flexible search and filtering so you can explore the surface area in detail and build workflows around the patterns that matter most to your organization.

You can, for example, quickly surface:

  • Undocumented APIs by filtering for endpoints seen in traffic or other data sources but missing from definitions (for example, by using the query api:n/a). These are shadow APIs that may be handling production traffic without governance or review.
  • Unused documented APIs by finding endpoints defined in specs but with no recent activity (for example, by using the query api:* last_seen_traffic<=(timestamp)). These often point to legacy or abandoned routes that you can deprecate or monitor for unexpected calls.
  • Endpoints handling sensitive data by filtering on personally identifiable information (PII) tags (such as by using pii:*) and combining them with authentication or ownership filters to check that high-sensitivity APIs are properly secured.
  • Endpoints under attack by querying for security activity, such as by using security_activity:* or, for more specific patterns, security_activity:attack_attempt.sql_injection.

These searches give teams a powerful way to investigate anomalies, validate assumptions about “low-risk” endpoints, and build continuous hygiene checks into their operational routines. Even more importantly, any search or filter combination can be saved as a custom finding query. AAP will then continuously evaluate your endpoints against that query and create findings when the conditions are met, turning ad hoc investigations into ongoing monitoring.

Detect and respond to risks with API Findings

Discovery and exploration are useful on their own, but most security teams also need a prioritized list of issues to work through. API Findings aggregates potential vulnerabilities and misconfigurations across your endpoints. Datadog provides built-in detection rules authored by security experts, and you can also define your own logic to match your environment’s patterns and policies.

Findings can flag issues such as:

  • Insecure authentication and authorization, such as endpoints that lack authentication or use weaker methods than expected
  • Sensitive data exposure, including PII in parameters or responses
  • API misconfigurations, such as missing rate limiting or overly permissive access
  • Deprecated or high-risk endpoints that are still receiving traffic

Each finding includes key context: severity, the affected endpoint and service, the relevant detection rule, and any related activity. This makes it easier for DevSecOps teams to triage and decide whether to tackle an issue immediately, add it to a remediation backlog, or adjust the underlying rule.

Datadog API Findings view showing a prioritized list of API security findings with severity, endpoint, and triage status.
Datadog API Findings view showing a prioritized list of API security findings with severity, endpoint, and triage status.

Because API Findings is deeply integrated with the rest of the Datadog platform, you can configure notifications for new findings and create monitors that alert the right on-call teams when high-severity issues appear. You can also add findings to dashboards alongside your application and infrastructure metrics, and trigger Datadog Workflow Automation to open tickets and notify owners. This helps close the loop between detection and remediation so issues discovered in APIs do not linger as static reports.

Understand your security posture at a glance

As the number of APIs grows, it becomes harder to answer simple questions about overall risk. AAP’s API posture overview gives you an organization-wide view of API security health so you can quickly see where to focus.

From the posture view, you can immediately see how many endpoints are documented versus undocumented, which endpoints have security findings broken down by severity, and which APIs are most frequently attacked or at elevated risk of account takeover.

API posture dashboard summarizing documented versus undocumented endpoints, number of findings by severity, and most attacked APIs.
API posture dashboard summarizing documented versus undocumented endpoints, number of findings by severity, and most attacked APIs.

This view helps teams quickly prioritize work. For example, you might first focus on undocumented endpoints with high-severity findings. You could also disable unused legacy APIs that still receive attack traffic. Finally, you can coordinate with service owners to fix medium-severity misconfigurations in heavily used endpoints.

Because the posture overview is built on the same live data as API Inventory and Findings, it updates as you document APIs, deploy fixes, and tune detection rules. This gives you a feedback loop between engineering work and measurable improvements to API security.

Turn API visibility into continuous protection

Visibility is only useful if it changes how teams work. Datadog App and API Protection is designed to take you from one-time discovery to continuous protection by bringing observability data and security context into a single workflow.

With AAP, teams can:

  • Discover all APIs across environments, whether or not they are documented
  • Detect misconfigurations and vulnerabilities early, while changes are still fresh
  • Monitor usage trends and identify dormant or legacy APIs that can be retired
  • Automate notifications, escalation, and remediation tracking by using Datadog monitors and workflows

AAP is also evolving alongside modern API practices. New data sources will expand discovery coverage even further, and upcoming configurable scanners will let you define how sensitive data is detected and classified, as well as how authentication and rate-limiting configurations are evaluated. This gives organizations flexibility to adapt detections to their own policies and risk models. Early adopters are already using these capabilities to turn scattered API data into a clear, actionable map of their environment that encompasses who owns which APIs, what data they handle, and how well they are protected.

Start securing your APIs with Datadog

APIs are critical to your business, but they also represent one of its largest and fastest-changing attack surfaces. Datadog App and API Protection helps you bring that surface into focus, and detect and act on risky patterns without leaving the monitoring platform you already use to operate your services. To learn more, see the App and API Protection documentation. If you’re new to Datadog, .

Related Articles

Detect and respond to evolving attacks with Attacker Clustering

Detect and respond to evolving attacks with Attacker Clustering

Best practices for securing Kubernetes applications

Best practices for securing Kubernetes applications

How we use Datadog for detection as code

How we use Datadog for detection as code

Key metrics for monitoring AWS WAF

Key metrics for monitoring AWS WAF

Start monitoring your metrics in minutes