This page is not yet available in Spanish. We are working on its translation.
If you have any questions or feedback about our current translation project, feel free to reach out to us!

Protecting web applications and APIs requires a multi-layered approach that combines in-app monitoring and perimeter defenses. These complementary strategies enable you to have a defense-in-depth application security approach leveraging AWS Web Application Firewall (WAF) as the first line of defense, followed by ASM Threat Management to block attacks that slip by the WAF.

In-app monitoring: deep visibility with distributed tracing

At the application level, Datadog ASM Threat Management leverages distributed tracing to monitor microservices in real time. The ASM approach provides detailed, context-rich insights into the behavior of requests as they traverse various services. These insights detect sophisticated threats such as:

  • SQL Injection (SQLi) and Local File Inclusion (LFI) attempts.
  • Application logic abuse, such as bypassing business rules or exploiting edge cases.
  • Misuse of exposed endpoints.

Perimeter defense: blocking threats at the edge with AWS WAF

At the perimeter, AWS Web Application Firewall (WAF) acts as the first line of defense, filtering traffic before it reaches the application. These solutions are essential for blocking:

  • Large-scale botnet attacks or Distributed Denial of Service (DDoS) attacks.
  • Malicious bots attempting credential stuffing or scraping.

The importance of contextual, adaptive protection

Depending on the nature of the threat, protection controls should be applied at the appropriate layer: either in-app or at the perimeter. For example:

  • Perimeter protection use case: Blocking malicious IPs or volumetric attacks that can be mitigated efficiently at the network edge.
  • In-app protection use case: Detecting and blocking vulnerability exploits, abuse of business logic, or subtle anomalies in API usage.

This layered approach ensures threats are neutralized as early as possible without sacrificing the precision needed to protect legitimate traffic.

AWS WAF integration with ASM

There are two main use cases supported with this integration:

  1. Gain visibility of AWS WAF actions in Datadog ASM. For example:

    1. Metrics such as total requests allowed vs. blocked by the AWS WAF.
    2. Drill down and view individual AWS WAF logs (requires you to ingest AWS WAF logs into Datadog).
    3. How AWS WAF inspected the request: rules that were applied and the decision made (allow, block, or count).
    Note that ASM converts AWS WAF logs into ASM Traces, enabling you to view application activity (traces) and AWS WAF activity (logs converted to ASM traces) in the ASM Trace Explorer.
    AWS WAF integration details in Datadog UI
  2. Leverage AWS WAF to block attackers:

    1. Connect your AWS WAF IP set(s) with Datadog ASM. You can use an existing set or create a new one. Datadog will add blocked IP addresses to this IP set. You can block attackers from ASM Signals or Traces explorers.
    ASM denylist blocked IPs

Further reading

Más enlaces, artículos y documentación útiles: