Sensitive Data Scanner | Datadog
Sensitive Data Scanner

Sensitive Data Scanner

Discover, classify, and protect sensitive data to build a modern compliance strategy at scale.

Datadog Sensitive Data Scanner provides complete visibility into the flow of PII data. As we migrate to the cloud, it has become a critical part of our data loss prevention strategy.
Kevin McGill

Kevin McGill

VP Cloud Services, Citizens Bank

Datadog Sensitive Data Scanner provides complete visibility into the flow of PII data. As we migrate to the cloud, it has become a critical part of our data loss prevention strategy.
Kevin McGill

Kevin McGill

VP Cloud Services, Citizens Bank

Datadog’s Sensitive Data Scanner helps businesses meet compliance goals by discovering, classifying, and hiding sensitive information within your log data—in real-time and at scale. Datadog scans your logs for patterns of sensitive data upon ingestion and then hashes or redacts it following built-in or user-defined rules to help businesses stay compliant with GDPR, HIPAA, CCPA, and more.


Classify sensitive data based on its content, source, or designated risk level

  • Standardize data classification across dev, ops, and security teams and across different cloud platforms and hybrid environments
  • Accelerate classification through out-of-the-box rules that capture common patterns, such as credit card numbers, API keys, tokens, AWS secret keys, and others
  • Inform data governance policies with searchable tags on risk level, data source and priority about your company’s management of sensitive private data

Discover sensitive data across your cloud environments

  • Save time by scanning and tagging of new hosts, containers and applications as soon as they are spun up
  • Tag sensitive data to allow teams to create real-time alerts and build dashboards
  • Reduce false positives with the help of industry-standard detection techniques, such as the Luhn algorithm
Automatically discover sensitive data across your cloud environment

Protect sensitive data from security breaches and both insider and external threat actors

  • Scrub sensitive data from your logs with predefined scanners from Datadog’s Data Scanner Library or custom scanners
  • Build a modern compliance strategy by combining sensitive data scanning with Datadog’s fully integrated role-based access control (RBAC) permissions and restriction queries
  • Use audit logs to keep a full record of user activity on the Datadog platform

Resources