이 제품은 선택한 Datadog 사이트에서 지원되지 않습니다. ().
이 페이지는 아직 한국어로 제공되지 않습니다. 번역 작업 중입니다.
현재 번역 프로젝트에 대한 질문이나 피드백이 있으신 경우 언제든지 연락주시기 바랍니다.
Collecting events using Cloud Security affects your billing. For more information, see Datadog Pricing.

The following table summarizes the Cloud Security features available relative to each deployment type.

Deployment typeAgent Required (7.46+)MisconfigurationsVulnerabilitiesIdentity RisksAgentless Scanning
AWS Account
Azure Subscription
GCP Project
OCI Tenancy
Terraform
Docker
Kubernetes
Linux
Amazon ECS/EKS
Windows
AWS Fargate ECS/EKSECS Fargate only

The following table summarizes the scope of coverage available relative to each Cloud Security feature.

Resources monitoredMisconfigurationsVulnerabilitiesIdentity RisksAgentless scanning
AWS Resources/IAM
Azure Resources/IAM
GCP Resources/IAM
OCI Resources/IAM
Kubernetes Cluster
Docker Host
Linux Host
Windows Host
Docker Container
Container Image

Note: Cloud Security Misconfigurations additionally monitors common resources used in your cloud accounts that are running Windows and AWS Fargate, such as EC2 instances, RDS, S3, and ELB.