Getting Started with Application Security Management

Overview

Datadog Application Security Management (ASM) helps secure your web applications and APIs in production.

  • With threat detection, Datadog provides real-time protection against attacks and attackers targeting code-level vulnerabilities.
  • With Code Security, Datadog detects code and library vulnerabilities in your repositories and your running services, providing end-to-end visibility from development to production.

This guide walks you through best practices for getting your team up and running with ASM.

Identify services that have security risk

Identify services vulnerable or exposed to attacks that would benefit from ASM. On the Software Catalog > Security page, view and select the services you wish to enable.

ASM Services page view, showing Vulnerabilities and sorted by Suspicious requests column.

These security insights are detected from data reported by APM. The insights help prioritize your security efforts. ASM identifies, prioritizes, and helps remediate all security risks on your services.

Note: If no vulnerabilities or suspicious requests are reported, ensure your services are using a recent Datadog tracing library version. From the Security Software Catalog, open any service’s side panel and look at its Tracing Configuration.

Tracer Configuration tab in APM Software Catalog page view. Highlighting which version of the Datadog Agent, and Datadog tracing library are being used by your services.

Enable ASM

Enable ASM with in-app instructions

Enable ASM with Remote Configuration

Prerequisites:

Setup Remote Configuration (if not enabled already)

Follow the steps to enable Remote Configuration in your Datadog UI. This includes:

  1. Activate Remote Config capability for your organization.
  2. Add Remote Configuration capability to an existing API key, or create a new one.
  3. Update your Datadog Agent configuration to use the API key with Remote Configuration capability.

See Setting up Remote Configuration for more information.

Test ASM

Once enabled, ASM immediately identifies application vulnerabilities and detects attacks and attackers targeting your services.

  1. Validate vulnerabilities: Navigate to the Vulnerabilities tab, triage and remediate your vulnerabilities.
  2. Validate attacks: Send attack patterns to trigger a test detection rule. From your terminal, run the following script:
  for ((i=1;i<=250;i++)); do
  # Target existing service's routes
  curl https://your-application-url/<EXISTING ROUTE> -A
  'dd-test-scanner-log';
  # Target non existing service's routes
  curl https://your-application-url/<NON-EXISTING ROUTE> -A
  'dd-test-scanner-log';
  done
  1. Go to Security Signals Explorer to see the signal that is generated after a few seconds.

Disable ASM

For information on disabling ASM or its related capabilities, see the following:

Reports and notifications

  1. Set up notification rules to receive alerts using Slack, Jira, email, and more.
  2. Subscribe to the weekly threat digest reports to begin investigation and remediation of the most important security threats discovered in the last seven days.

Interested in best practices to go further? View the in-product Quickstart Guide.

Further reading