Datadog Cloud Security Management | Datadog
Cloud Security Management

Cloud Security Management

Simplified cloud security for DevOps and Security teams

Watch Video

Watch Video

Datadog Cloud Security Management provides vulnerability management, automated compliance checks, continuous posture management, real-time threat detection, identity risk assessments and a comprehensive resource inventory for your entire cloud infrastructure in one unified platform. With a unified platform and real-time observability context, DevOps and Security teams can quickly remediate issues and continuously improve their organization’s security posture.


Vulnerability Management

  • Detect, prioritize, and manage vulnerabilities in your organization’s containers and hosts
  • Prioritize cloud vulnerabilities based on potential business impact, real-time observability context, and Datadog’s curated security research
  • Streamline collaboration between security and DevOps teams by providing shared visibility across infrastructure monitoring and security views
LEARN MORE
Vulnerability Management

Cloud Security Posture Management (CSPM)

  • Run continuous configuration checks across your cloud accounts, hosts, and containers to assess your security posture
  • Track conformance to requirements of industry benchmarks and other controls, such as CIS, PCI DSS, SOC 2, and more, with flexible customization options
  • Improve collaboration and resolution times of misconfigurations by automatically routing alerts to the right teams and quickly accessing resource ownership, configuration, and remediation steps
LEARN MORE
Cloud Security Posture Management

Cloud Workload Security (CWS)

  • Get kernel-level visibility into workload activity across your hosts and containers to uncover threats
  • Use curated out-of-the-box workload threat detection rules researched, developed, and maintained by Datadog security research
  • Detect unknown threats and anomalous process, network, or file activity using workload behavior modeling
  • Maintain critical file controls and detect problems in real time with Datadog File Integrity Monitoring (FIM)
  • Gain unparalleled visibility into your workloads with support for most major Linux distributions, Windows Servers, AWS Fargate, Docker, and Containerd
LEARN MORE
Cloud Workload Security

Cloud Infrastructure Entitlement Management (CIEM)

  • Secure your cloud infrastructure from IAM-based attacks by mitigating excessive permissions gaps, controlling administrative privileges, and reducing the potential blast radius of security incidents
  • Access full summaries of detected identity risks, including how resources can be accessed, related permissions, and remediation steps for efficient mitigation
  • Proactively defend against evolving identity risks with curated rules and best practices, continually updated by Datadog’s security research
LEARN MORE
Cloud Infrastructure Entitlement Management

Kubernetes Security Posture Management (KSPM)

  • Strengthen the security posture of your Kubernetes deployments by benchmarking your environment against industry-standard frameworks like CIS
  • Evaluate your organization’s compliance and security progress across teams, accounts, and Kubernetes deployments over time with the Datadog Posture Score
  • Address specific security requirements by tailoring detection rules, either by duplicating an existing control or designing one from scratch
Kubernetes Security Posture Management

Security Inbox

  • Prioritize vulnerabilities, misconfigurations, identity risks, and other signals in one actionable place based on severity of impact to your security posture
  • Automatically correlate observability and security data to identify top issues across security threats, misconfigurations, vulnerabilities, and other detections
  • Assess the blast radius and probability of resource exploitation with relationship graphs that visualize interdependencies within your cloud environment
Security Inbox
Using Cloud Security Management was like having a member of the InfoSec team embedded within our engineering team. All the security metrics were front and center so they could easily see the number of misconfigured resources in a single view and they didn’t have to wait for someone from InfoSec to reach out and let them know there was an issue.
Chad Upton
Chad Upton Vice President of Infrastructure at Firstup

Customer Testimonials

Using Cloud Security Management was like having a member of the InfoSec team embedded within our engineering team. All the security metrics were front and center so they could easily see the number of misconfigured resources in a single view and they didn’t have to wait for someone from InfoSec to reach out and let them know there was an issue.
Chad Upton

Chad Upton

Vice President of Infrastructure at Firstup

Resources

products/csm/csm_product_hero_desktop

official docs

Getting Started with Cloud Security Management
/blog/security-inbox/security-inbox-hero

BLOG

Easily identify and prioritize your top security risks with Datadog Security Inbox
/blog/datadog-ciem/ciem-hero

BLOG

Find and remediate identity risks with Datadog CIEM
blog/state-of-cloud-security/state-of-cloud-security-2023/hero-final-no-text

BLOG

State of Cloud Security
Get started with Cloud Security Management today with a 14-day free-trial