This product is not supported for your selected Datadog site. ().
このページは日本語には対応しておりません。随時翻訳に取り組んでいます。
翻訳に関してご質問やご意見ございましたら、お気軽にご連絡ください

Overview

With App and API Protection (AAP) enabled, the Datadog tracing library actively monitors all web services and API requests for suspicious security activity.

An In-App WAF rule specifies conditions on the incoming request to define what the library considers suspicious. The Datadog tracing library includes hundreds of out-of-the-box AAP In-App WAF rules, which are used to display security traces in the trace explorer and in the default signal rules.

You can add to the In-App WAF rules without upgrading the tracing library.

Structure of an AAP In-App WAF rule

An In-App WAF rule is a JSON object composed of a category, a name, tags, and conditions. When a security trace is detected, tags from the rules are propagated onto the security trace, and can be used to build detection rules.

Conditions

Conditions define when the rule tags an incoming request. The conditions are composed of inputs and operators.

Inputs

An input represents which part of the request the operator is applied to. The following inputs are used in the In-App WAF rules:

NameDescriptionExample
server.request.uri.rawThe full request URI received by the application servicehttps://my.api.com/users/1234/roles?clientId=234
server.request.path_paramsThe parsed path parameters (key/value map)userId => 1234
server.request.queryThe parsed query parameters (key/value map)clientId => 234
server.request.headers.no_cookiesThe incoming http requests headers, excluding the cookie header (key/value map)user-agent => Zgrab, referer => google.com
grpc.server.request.messageThe parsed gRPC message (key/value map)data.items[0] => value0, data.items[1] => value1
server.request.bodyThe parsed HTTP body (key/value map)data.items[0] => value0, data.items[1] => value1
server.response.statusThe http status code200

Operators

nameDescription
match_regexPerform regular expression match on the inputs
phrase_matchPerform a fast keyword list matching
is_xssSpecial operator to check for cross-site scripting (XSS) payloads
is_sqliSpecial operator to check for SQL injection (SQLI) payloads

Custom In-App WAF rules

Custom In-App WAF rules enable users to log or block specific types of requests to their applications. For example, you can use custom rules to monitor login success or failure. To get started, navigate to Security -> App and API Protection -> Policies -> In-App WAF -> Custom Rules.

Note: Default rules in In-App WAF are read-only. To refine your In-App WAF behavior, modify the In-App WAF rules. Default rules cannot be modified, however, you can create a custom rule based on one of the default rules, and modify the match conditions to your needs. Be sure to disable the default rule so that you don’t have two similar rules evaluating the same requests.

Suggested rules

Datadog’s App and API Protection Suggested Rules feature automatically analyzes application traffic and proposes rules to help monitor and protect login and API flows. Rules are pre-built around common authentication patterns like users.login.success or users.login.failure, which are the most critical signals for detecting suspicious login behavior.

Suggested rules benefits include:

  • Reducing manual configuration by offering baseline coverage for authentication endpoints.
  • Improving the speed of deploying protections across services and environments to guard against common attack vectors like brute force, credential stuffing, and automated login abuse.
  • Providing high-fidelity telemetry on login attempts that can be correlated with anomalous patterns such as sudden bursts of failed logins, repeated attempts from the same IP, or login activity from unusual geographies.
  • Providing visibility for account takeover (ATO) protection, where most ATO campaigns are surfaced first through abnormal authentication activity.
  • Detecting and responding to credential abuse before accounts are compromised.

Suggested rules use cases include:

  • Quickly deploy protections for brute force, credential stuffing, and bot-driven login abuse.
  • Use Suggested Rules as baselines for ATO protection by tracking successful and failed login attempts and tuning conditions (for example, the POST method plus 401/403 failures).
  • Apply consistent detection logic across services to make it harder for attackers to bypass defenses in less monitored environments.
  • Detect signs of account takeover attempts by monitoring abnormal login activity (for example, spikes in failures, unusual login success rates after repeated failures).

To use a suggested rule, do one of the following:

  • Create a custom rule from a suggested rule:
    1. In Suggested Rules, select one or more rules and click Create Selected Suggested Rules.
    2. In Create suggested custom In-App WAF rules, click Create rules. This creates custom In-App WAF rules to monitor the security activities of the rules you selected.
  • Modify a suggested rule to create a custom rule:
    1. In Suggested Rules, identify a rule you want to use and click View suggested rule.
    2. In Add a new Business Logic, edit the rule as needed.
    3. Click Continue in In-App WAF.
    4. In Define your custom rule, make any further changes.
    5. Click Save Rule.

Configure an AAP In-App WAF rule

Blocking on a service is defined through the policy rules. Three Datadog default policies are included in the In-App WAF: Datadog Recommended, Datadog Monitoring-only, which monitors attacks only, and Datadog Block Attack tools, which blocks attack tools and monitors all other attacks.

Services using a policy are visible directly in the policy management page.

  1. In Datadog, navigate to Security > App and API Protection > Policies > In-App WAF.

    In-App WAF configuration page, showing two default policies.
  2. Click on the three dots to the right of one of the policies, and select Download Configuration of this Policy to download the configuration file to your local machine.

  3. Optionally, select Apply this Policy to Services to apply a default policy to one or more of your protection enabled AAP services.

    Note: A policy can be applied to one or more services, but a service can only contain one policy.

  4. Update the file to include the JSON definition of your new rule, following the specification above. For example:

        {
            "id": "id-123",
            "name": "My In-App WAF rule",
            "tags": {
                "category": "attack_attempt",
                "crs_id": "920260",
                "type": "http_protocol_violation"
            },
            "conditions": [
                {
                    "operator": "match_regex",
                    "parameters": {
                        "inputs": [
                            {
                                "address": "server.request.uri.raw"
                            }
                        ],
                        "options": {
                            "case_sensitive": true,
                            "min_length": 6
                        },
                        "regex": "\\%u[fF]{2}[0-9a-fA-F]{2}"
                    }
                }
            ],
            "transformers": []
        },
       
  5. Using a utility such as SCP or FTP, copy the appsec-rules.json file to your application server, for example, /home/asm/appsec-rules.json.

  6. Following the instructions in Enabling AAP for adding application variables in your environment, add the DD_APPSEC_RULES environment variable to your service with the full path to the file:

    DD_APPSEC_RULES=/home/asm/appsec-rules.json
    
  7. Restart your service.

What to do next

Next, configure detection rules to create security signals based on those security traces defined by the In-App WAF rules you created. You can modify the provided out-of-the-box AAP detection rules or create new ones.