---
title: Getting Started with Cloud Security
description: >-
  Deploy Datadog Cloud Security for unified visibility across your
  infrastructure. Configure threat detection, misconfigurations, identity risks,
  and vulnerabilities.
breadcrumbs: >-
  Docs > Getting Started > Getting Started with Security > Getting Started with
  Cloud Security
---

# Getting Started with Cloud Security

## Overview{% #overview %}

[Datadog Cloud Security](https://docs.datadoghq.com/security/cloud_security_management/) delivers deep visibility, continuous configuration audits, identity risk assessments, vulnerability detection, and real-time threat detection across your entire cloud infrastructure—all in a unified platform for seamless collaboration and faster remediation.

With Cloud Security, Security and DevOps teams can act on the shared context of observability and security data to quickly prioritize and remediate issues. This guide walks you through best practices for getting your team up and running with Cloud Security.

{% callout %}
# Important note for users on the following Datadog sites: app.ddog-gov.com

{% alert level="danger" %}
Agentless Scanning is not available in the selected site ().
{% /alert %}

{% /callout %}

## Phase 1: Deployment{% #phase-1-deployment %}

1. Using [Agentless](https://docs.datadoghq.com/security/cloud_security_management/setup/cloud_integrations) and/or the [Datadog Agent (version 7.46 or above)](https://app.datadoghq.com/account/settings/agent/latest), [enable Cloud Security for your cloud resources and infrastructure](https://docs.datadoghq.com/security/cloud_security_management/setup):
   - **[Threats](https://docs.datadoghq.com/security/threats/)**: Kubernetes, Docker, and host-based installations.
   - **[Misconfigurations](https://docs.datadoghq.com/security/cloud_security_management/misconfigurations/)**: AWS, Azure, GCP, OCI, Kubernetes, and Docker instructions.
   - **[Identity Risks](https://docs.datadoghq.com/security/cloud_security_management/identity_risks/)**: Enable AWS resource collection and Cloudtrail logs forwarding.
   - **[Vulnerabilities](https://docs.datadoghq.com/security/cloud_security_management/vulnerabilities/)**: Container image scanning and host scanning instructions for AWS, Azure, Kubernetes, ECS EC2 instances, and host-based installations.
1. Check out the [Cloud Security homepage](https://app.datadoghq.com/security/csm) to get an overview of your organization's risks and threats.
1. Review [500+ out-of-the-box Threats and Misconfigurations detection rules](https://docs.datadoghq.com/security/default_rules/#cat-cloud-security-management).
1. Review [Cloud Security Misconfigurations findings](https://docs.datadoghq.com/security/cloud_security_management/misconfigurations/findings/).
1. Review and remediate identity risks on the [Identity Risks](https://app.datadoghq.com/security/identities) page.
1. Review container vulnerabilities on the [Container Images](https://app.datadoghq.com/containers/images) page, and a consolidated list of vulnerabilities on the [Infrastructure Vulnerability](https://app.datadoghq.com/security/infra-vulnerability) page.
1. Set up [notification rules](https://app.datadoghq.com/security/configuration/notification-rules) and receive alerts using Slack, Jira, email, and more.

## Phase 2: Customization{% #phase-2-customization %}

1. Set up [Workload Protection suppression rules](https://docs.datadoghq.com/security/cloud_security_management/guide/tuning-rules/) to reduce noise.
1. Create custom detection rules for [Cloud Security Misconfigurations](https://docs.datadoghq.com/security/cloud_security_management/misconfigurations/custom_rules) and [Workload Protection](https://docs.datadoghq.com/security/workload_protection/agent_expressions).

## Phase 3: Reports and dashboards{% #phase-3-reports-and-dashboards %}

1. Assess your organization's posture by reviewing [compliance reports](https://docs.datadoghq.com/security/cloud_security_management/misconfigurations/frameworks_and_benchmarks).
1. Use out-of-the-box dashboards or [create your own](https://docs.datadoghq.com/dashboards/#overview) for faster investigations, reporting, and monitoring.
1. Subscribe to the weekly [security digest](https://app.datadoghq.com/security/configuration/reports) reports to begin investigation and remediation of the most important new security issues discovered in the last seven days.

## Disable Cloud Security{% #disable-cloud-security %}

For information on disabling Cloud Security, see the following:

- [Disable Cloud Security Vulnerabilities](https://docs.datadoghq.com/security/cloud_security_management/troubleshooting/vulnerabilities/#disable-cloud-security-vulnerabilities)
- [Disable Workload Protection](https://docs.datadoghq.com/security/workload_protection/troubleshooting/threats/#disable-csm-threats)

## Further reading{% #further-reading %}

- [Cloud Security](https://docs.datadoghq.com/security/cloud_security_management/)
- [Cloud Resources Schema Reference](https://docs.datadoghq.com/infrastructure/resource_catalog/schema/)
- [Automate end-to-end processes with Datadog Workflows](https://www.datadoghq.com/blog/automate-end-to-end-processes-with-datadog-workflows/)
- [How we detect and notify users about leaked Datadog credentials](https://www.datadoghq.com/blog/detecting-leaked-credentials/)
- [Join an interactive session to elevate your security and threat detection](https://dtdg.co/fe)
- [Security research, reports, tips, and videos from Datadog](https://securitylabs.datadoghq.com/)
