Cloud Security Supported Deployment Types
Cette page n'est pas encore disponible en français, sa traduction est en cours.
Si vous avez des questions ou des retours sur notre projet de traduction actuel,
n'hésitez pas à nous contacter.
Collecting events using Cloud Security Management will affect your billing. For more information, see
Datadog Pricing.
The following table summarizes the Cloud Security features available relative to each deployment type.
Deployment type | Agent Required (7.46+) | Misconfigurations | Vulnerabilities | Identity Risks | Agentless Scanning |
---|
AWS Account | | | | | |
Azure Account | | | Agentless Scanning (Preview) | | |
GCP Account | | | | | |
Terraform | | | | | |
Docker | | | | | |
Kubernetes | | | | | |
Linux | | | | | |
Amazon ECS/EKS | | | | | |
Windows | | | | | |
AWS Fargate ECS/EKS | | | | | |
The following table summarizes the scope of coverage available relative to each Cloud Security feature.
Resources monitored | Misconfigurations | Vulnerabilities | Identity Risks | Agentless scanning |
---|
Resources in AWS Account | | | | |
Resources in Azure Subscription | | | | |
Resources in GCP Project | | | | |
Kubernetes Cluster | | | | |
Docker Host | | | | |
Linux Host | | | | |
Windows Host | | | | |
Docker Container | | | | |
Container Image | | | | |
IAM in AWS Account | | | | |
Note: Cloud Security Misconfigurations additionally monitors common resources used in your cloud accounts that are running Windows and AWS Fargate, such as EC2 instances, RDS, S3, and ELB.