Datadog Cloud Security Management | Datadog
Cloud Security Management

Cloud Security Management

Cloud native security simplified for DevOps and Security

Watch Video

Watch Video

Datadog Cloud Security Management delivers a comprehensive resource inventory, real-time threat detection, continuous configuration audits, identity risk assessments, and vulnerability management across your entire cloud infrastructure, all in a unified platform for seamless collaboration and faster remediation. By combining security risks with comprehensive observability context, security and DevOps teams can prioritize signals, proactively mitigate threats, and continuously enhance their organization’s security posture.


Cloud Security Posture Management (CSPM)

  • Run continuous configuration checks across your cloud accounts, hosts, and containers to assess your security posture
  • Track conformance to requirements of industry benchmarks and other controls, such as CIS, PCI DSS, SOC 2, and more, with flexible customization options to meet specific requirements
  • Improve collaboration and expedite mean time to resolution (MTTR) by automatically routing alerts to the right teams and accessing customizable views of potential misconfigurations that specify resource ownership, configuration, and remediation steps
  • Learn more
Cloud Security Posture Management

Cloud Workload Security (CWPP)

  • Get kernel-level visibility into workload activity across your hosts and containers to uncover threats
  • Use curated out-of-the-box workload threat detection rules researched, developed, and maintained by Datadog security research
  • Detect unknown threats and anomalous process, network, or file activity using workload behavior modeling
  • Maintain critical file controls and detect problems in real time with Datadog File Integrity Monitoring (FIM)
  • Learn more
Cloud Workload Security

Cloud Infrastructure Entitlement Management (CIEM)

  • Secure your cloud infrastructure from IAM-based attacks by mitigating excessive permissions gaps, controlling administrative privileges, and reducing the potential blast radius of security incidents
  • Access full summaries of detected identity risks, including how resources can be accessed, related permissions, and remediation steps for efficient mitigation
  • Proactively defend against evolving identity risks with curated rules and best practices, continually updated by Datadog’s security research
  • Learn more
Cloud Infrastructure Entitlement Management

Vulnerability Management

  • Detect, prioritize, and manage vulnerabilities in your organization’s containers and hosts
  • Prioritize cloud vulnerabilities based on potential business impact, deep observability context, and Datadog’s curated security research
  • Streamline collaboration between security and DevOps teams by providing shared visibility across infrastructure monitoring and security views
  • Learn more
Vulnerability Management

Security Inbox

  • View a prioritized list of security issues in the Security Inbox that combines various security findings, misconfigurations, identity risks, and other detections into a single actionable list based on severity of impact to your security posture
  • Automatically correlate observability and security data to identify top issues across security threats, misconfigurations, vulnerabilities, and other detections
  • Assess the blast radius and probability of resource exploitation with detailed relationship graphs that visualize interconnections and dependencies within your cloud environment
Security Inbox
Using Cloud Security Management was like having a member of the InfoSec team embedded within our engineering team. All the security metrics were front and center so they could easily see the number of misconfigured resources in a single view and they didn’t have to wait for someone from InfoSec to reach out and let them know there was an issue.
Chad Upton

Chad Upton

Vice President of Infrastructure at Firstup

Customer Testimonials

Using Cloud Security Management was like having a member of the InfoSec team embedded within our engineering team. All the security metrics were front and center so they could easily see the number of misconfigured resources in a single view and they didn’t have to wait for someone from InfoSec to reach out and let them know there was an issue.
Chad Upton

Chad Upton

Vice President of Infrastructure at Firstup

Resources

products/csm/csm_product_hero_desktop

official docs

Getting Started with Cloud Security Management

products/csm/product_brief_hero_cloud_security_management

press release

Datadog Launches Cloud Security Management To Provide Cloud Native Application Protection

/blog/security-context-with-datadog-cloud-security-management/datadog-cloud-security-management-hero-v2

BLOG

Add security context to observability data with Datadog Cloud Security Management

blog/state-of-aws-security/state-of-aws-security-2022/thumbnail

BLOG

State of AWS Security