このページは日本語には対応しておりません。随時翻訳に取り組んでいます。翻訳に関してご質問やご意見ございましたら、お気軽にご連絡ください。
Collecting events using Cloud Security Management will affect your billing. For more information, see Datadog Pricing.

The following table summarizes the CSM features available relative to each deployment type.

Deployment typeAgent Required (7.46+)CSM MisconfigurationsCSM ThreatsCSM VulnerabilitiesCSM Identity RisksCSM Agentless Scanning
AWS Account
Azure AccountAgentless Scanning (beta)
GCP Account
Terraform
Docker
Kubernetes
Linux
Amazon ECS/EKS
Windowsbeta
AWS Fargate ECS/EKSbeta

The following table summarizes the scope of coverage available relative to each CSM feature.

Resources monitoredCSM MisconfigurationsCSM ThreatsCSM VulnerabilitiesCSM Identity RisksCSM Agentless scanning
Resources in AWS Account
Resources in Azure Subscription
Resources in GCP Project
Kubernetes Cluster
Docker Host
Linux Host
Windows Hostbeta
Docker Container
Container Image
IAM in AWS Account

Note: CSM Misconfigurations additionally monitors common resources used in your cloud accounts that are running Windows and AWS Fargate, such as EC2 instances, RDS, S3, and ELB.