Despliega Cloud Security con integraciones de la nube
Utiliza las siguientes instrucciones para activar Misconfigurations and Identity Risks (CIEM) en AWS, Azure y GCP.
Activar la exploración de recursos
Para activar el análisis de recursos para tus cuentas en la nube, primero debes configurar la integración y, a continuación, activar Cloud Security para cada cuenta de AWS, Azure y Google Cloud.
Collecting events using Cloud Security Management will affect your billing. For more information, see
Datadog Pricing.
Set up the Datadog AWS integration
If you haven’t already, set up the Amazon Web Services integration. You must also enable resource collection by attaching the AWS-managed SecurityAudit Policy to the Datadog IAM role in your AWS account.
Enable Cloud Security for your AWS accounts
- On the Cloud Security Setup page, click Cloud Integrations.
- Expand the AWS section and click the account you want to enable Cloud Security for. A side panel with configuration options for that account opens.
- Under Features, beside each feature you want to enable, turn on the Enable toggle.
- To create a filter that excludes certain resources from being evaluated by Cloud Security, under Evaluation Filters, click Limit to Specific Resources. Then, click Add Resource Tags, add
key:value tags as required, and click Save. For more information, see Use Filters to Exclude Resources from Evaluation.
Set up the Datadog Azure integration
If you haven’t already, set up the Microsoft Azure integration.
Note: To access the full set of Azure compliance rules—including Identity Risks—you must enable the following permissions for the Microsoft Graph API.
AuditLog.Read.AllAdministrativeUnit.Read.AllApplication.Read.AllDirectory.Read.AllDomain.Read.AllGroup.Read.AllPolicy.Read.AllPrivilegedAssignmentSchedule.Read.AzureADGroupPrivilegedEligibilitySchedule.Read.AzureADGroupRoleManagement.Read.AllUser.Read.All
Enable Cloud Security for your Azure subscriptions
- On the Cloud Security Setup page, click Cloud Integrations.
- Expand the Azure section.
- To enable resource scanning for a subscription, switch the Resource Scanning toggle to the on position.
- To create a filter that excludes certain resources from being evaluated by Cloud Security, click the Plus (+) icon under Resource Evaluation Filters (Optional). For more information, see Use Filters to Exclude Resources from Evaluation.
- Click Done.
The Datadog Google Cloud Platform integration uses service accounts to create an API connection between Google Cloud and Datadog. To enable metric collection, create a service account, and then provide Datadog with the service account credentials to begin making API calls on your behalf. For step-by-step instructions, see Create your Google Cloud service account.
Note: Google Cloud billing, the Cloud Monitoring API, the Compute Engine API, and the Cloud Asset API must all be enabled for the projects you wish to monitor.
Datadog
- In Datadog, navigate to the Google Cloud Platform Integration page.
- On the Configuration tab, locate the service account and select Upload Private Key File to integrate the project with Datadog.
- Upload the JSON file, then click Update Configuration.
- To monitor multiple projects, use one of the following methods:
- Repeat the process above to use multiple service accounts.
- Use the same service account by updating the
project_id in the downloaded JSON file. Then, upload the file to Datadog as described in steps 1-3.
Enable Cloud Security for your Google Cloud projects
- On the Cloud Security Setup page, click Cloud Integrations.
- Expand the GCP section.
- To enable resource scanning for a project, switch the Resource Scanning toggle to the on position.
- To create a filter that excludes certain resources from being evaluated by Cloud Security, click the Plus (+) icon under Resource Evaluation Filters (Optional). For more information, see Use Filters to Exclude Resources from Evaluation.
- Click Done.
Desactivar la exploración de recursos
Puedes acceder a los resultados históricos de los últimos 15 meses incluso si la exploración de recursos está desactivada.
- En la page (página) Cloud Security Setup (Configuración de Cloud Security), haz clic en Cloud Integrations > AWS (Integraciones en la nube > AWS).
- Si es necesario, utiliza filtros para buscar la cuenta para la que deseas detener el análisis de recursos. Haz clic en la cuenta para abrir el panel lateral que contiene sus parámetros.
- En la pestaña Features (Funciones), junto a Posture Management (Gestión de la postura), cambia el conmutador Enable (Activar) a la posición de desactivado.
- En la page (página) Cloud Security Setup (Configuración de Cloud Security), haz clic en Cloud Integrations > Azure (Integraciones en la nube > Azure).
- Para detener el análisis de recursos para una cuenta, cambia el conmutador Resource Scanning (Análisis de recursos) a la posición de desactivado.
- Haz clic en Done (Listo).
- En la page (página) Cloud Security Setup (Configuración de Cloud Security), haz clic en Cloud Integrations > GCP (Integraciones en la nube > GCP).
- Para detener el análisis de recursos para una cuenta, cambia el conmutador Resource Scanning (Análisis de recursos) a la posición de desactivado.
- Haz clic en Done (Listo).