Cette page n'est pas encore disponible en français, sa traduction est en cours.
Si vous avez des questions ou des retours sur notre projet de traduction actuel, n'hésitez pas à nous contacter.

Overview

Cloud SIEM applies detection rules to all processed logs in Datadog to detect threats such as targeted attacks, communication with threat intel-listed IPs, or insecure resource modifications. Detected threats are surfaced as Security Signals in the Security Signals Explorer for triage.

This guide walks you through the following steps to start detecting threats with your OCI Audit logs:

  1. Set up Datadog’s OCI integration
  2. Enable log collection
  3. Use Cloud SIEM to triage Security Signals

Set up Datadog’s OCI integration

Set up Datadog’s OCI integration using either the QuickStart (recommended) or the Terraform method.

Enable log collection

Ensure that log collection is enabled in the Datadog OCI integration tile:

The OCI integration tile in Datadog with log collection enabled

Use Cloud SIEM to triage Security Signals

Cloud SIEM applies out-of-the-box detection rules to all processed logs, including your OCI Audit logs. When a threat is detected with a detection rule, a Security Signal is generated and can be viewed in the Security Signals Explorer.

Further reading