Cloud Security Supported Deployment Types
이 페이지는 아직 한국어로 제공되지 않습니다. 번역 작업 중입니다.
현재 번역 프로젝트에 대한 질문이나 피드백이 있으신 경우
언제든지 연락주시기 바랍니다.Collecting events using Cloud Security affects your billing. For more information, see
Datadog Pricing.
The following table summarizes the Cloud Security features available relative to each deployment type.
| Deployment type | Agent Required (7.46+) | Misconfigurations | Vulnerabilities | Identity Risks | Agentless Scanning |
|---|
| AWS Account | | | | | |
| Azure Subscription | | | | | |
| GCP Project | | | | | |
| OCI Tenancy | | | | | |
| Terraform | | | | | |
| Docker | | | | | |
| Kubernetes | | | | | |
| Linux | | | | | |
| Amazon ECS/EKS | | | | | |
| Windows | | | | | |
| AWS Fargate ECS/EKS | | | | | ECS Fargate only |
The following table summarizes the scope of coverage available relative to each Cloud Security feature.
| Resources monitored | Misconfigurations | Vulnerabilities | Identity Risks | Agentless scanning |
|---|
| AWS Resources/IAM | | | | |
| Azure Resources/IAM | | | | |
| GCP Resources/IAM | | | | |
| OCI Resources/IAM | | | | |
| Kubernetes Cluster | | | | |
| Docker Host | | | | |
| Linux Host | | | | |
| Windows Host | | | | |
| Docker Container | | | | |
| Container Image | | | | |
Note: Cloud Security Misconfigurations additionally monitors common resources used in your cloud accounts that are running Windows and AWS Fargate, such as EC2 instances, RDS, S3, and ELB.