OCI Configuration Guide for Cloud SIEM

이 페이지는 아직 한국어로 제공되지 않습니다. 번역 작업 중입니다.
현재 번역 프로젝트에 대한 질문이나 피드백이 있으신 경우 언제든지 연락주시기 바랍니다.

Overview

Cloud SIEM applies detection rules to all processed logs in Datadog to detect threats such as targeted attacks, communication with threat intel-listed IPs, or insecure resource modifications. Detected threats are surfaced as Security Signals in the Security Signals Explorer for triage.

This guide walks you through the following steps to start detecting threats with your OCI Audit logs:

  1. Set up Datadog’s OCI integration
  2. Enable log collection
  3. Use Cloud SIEM to triage Security Signals

Set up Datadog’s OCI integration

Set up Datadog’s OCI integration using either the QuickStart (recommended) or the Terraform method.

Enable log collection

Ensure that log collection is enabled in the Datadog OCI integration tile:

The OCI integration tile in Datadog with log collection enabled

Use Cloud SIEM to triage Security Signals

Cloud SIEM applies out-of-the-box detection rules to all processed logs, including your OCI Audit logs. When a threat is detected with a detection rule, a Security Signal is generated and can be viewed in the Security Signals Explorer.

Further reading