Introduction of Datadog SIEM

Overview

Datadog, the monitoring and security platform for cloud applications launched Cloud Security Platform in 2021, adding full-stack security context to Datadog’s deep observability capabilities. This new offering enables organizations to use a single platform to correlate security insights with monitoring data across infrastructure, network and application tiers, providing Security teams with the visibility they need to understand and respond to potential threats faster.

Datadog’s Cloud Security Platform delivers real-time threat detection and continuous configuration audits across your entire production environment, so you can bring speed and scale to your security organization. The Cloud Security Platform is built on top of Datadog’s observability platform, which breaks down silos between Security and DevOps teams and aligns them to shared organizational goals.

Datadog’s Cloud Security Platform addresses these challenges by enabling DevOps and Security teams to access a shared source of truth supported by a common data model. With Datadog,

  • in parallel to detecting potential threats,
  • Security leaders now have access to the underlying infrastructure,
  • network and application data at the time of an attack,
  • meaning they have deeper insights that enable more accurate threat detection and accelerated incident response.
  • And, Datadog’s platform approach ensures that this data is automatically correlated and presented in context, without requiring manual analysis.

The Datadog Cloud Security Platform includes:

  • Cloud Security Posture Management (CSPM) makes it easy to track whether your production environment complies with industry standards, such as PCI DSS, SOC 2 and HIPAA, and catches misconfigurations that leave your organization vulnerable to potential attacks.
  • Cloud Workload Security (CWS) detects threats to your production workloads by monitoring file and process activity across your environments to help catch host and infrastructure-based attacks.
  • Security Monitoring identifies threats to your cloud environments by analyzing operational and security logs. As an easy-to-use cloud-native SIEM, Security Monitoring provides out-of-the-box security integrations and threat detection rules that are easy to extend and customize.
  • Application Security, currently in beta, provides protection against application-level threats by identifying and blocking attacks that target code-level vulnerabilities, such as SQL injections and cross-site scripting (XSS) exploits.
  • Unified Observability and Security Reporting allows seamless pivots between DevOps telemetry and security insights. This unified experience enables Security teams to understand the operational and business impact of security incidents, and DevOps teams to see security signals alongside the metrics, traces and logs of their services.

Advantage of Datadog’s Cloud Security Platform

Real-time detection

  • Remain vigilant with always-on security monitoring that detects attacks at any time, not on a schedule
  • Leverage continuous scanning to identify misconfigurations, as well as suspicious file and process activity, in real time
  • Detect threats quickly, regardless of the scale of your system, the volume of your data, or the complexity of your rules

Security data in context

  • View and correlate context-rich security signals to reconstruct attack paths and secure your environment
  • Assess the business impact of security incidents by pivoting seamlessly between security signals and full-stack telemetry
  • Get additional insight into security threats through automatic enrichment of ingested logs

A unified platform for DevOps and Security

  • Maintain efficient DevOps practices while implementing robust threat detection and incident response workflows
  • Enable developers to focus on building new features—not securing your environment
  • Leverage the existing Agent and integrations to achieve new security visibility

Immediate time to value

  • Get started quickly with out-of-the-box threat detection rules, dashboards, and more
  • Correlate threats with application logs and telemetry from more than 500 turn-key integrations
  • Detect threats without specialized knowledge of a query language

Full-stack defense across applications, workloads, and infrastructure

  • Prevent a single security vulnerability from compromising your entire infrastructure
  • Secure your full stack: infrastructure, hosts, containers, and applications
  • Identify malicious activity at any stage of an attack

Datadog integrations

Datadog can now detect threats in real time and investigate security alerts across your infrastructure metrics, distributed traces, and logs. Now, your full engineering organization—including development, operations, and security—has comprehensive visibility across all layers of your environment using a single unified platform.

Datadog’s more than 500 integrations let you collect metrics, logs, and traces from your entire stack as well as from your security tools, giving you end-to-end visibility into your environment. This lets you cast a wider net to catch possible security issues, and provides deeper context during your investigations. For example, if you detect abnormally high CPU utilization on a host, you can pinpoint which container or process is causing it to determine if you’re dealing with a crypto-miner.

Summary – Datadog Security Monitoring

Comprehensive security visibility from observability data
Real-time threat detection
    Simple and flexible rule creation
    Threat detection “Without Limits”
Correlate and triage security signals
Add security visibility to your monitoring
Rajesh Kumar
Follow me
Subscribe
Notify of
guest
3 Comments
Newest
Oldest Most Voted
Inline Feedbacks
View all comments
Mantosh Singh
Mantosh Singh
2 years ago

Datadog SIEM explained very well. Thanks for the hard work made it simple to understand.

Sushant Kumar
Sushant Kumar
2 years ago

Cloud SIEM is part of the Datadog Cloud Security Platform, which protects an organization’s production environment with a full-stack offering that provides threat detection, posture management, workload security, and application security. Thanks for sharing

sam
sam
2 years ago

Clear Explanation Thanks for these.

3
0
Would love your thoughts, please comment.x
()
x