Join the Preview!

Automation Pipelines is in Preview. To enroll in the Preview for due date rules, click Request Access.

Request Access

Configure due date rules to ensure vulnerabilities are addressed within your specified SLO time frames. By setting these due dates, you can automate accountability, meet compliance requirements, and prioritize the prompt remediation of security issues, thereby preventing potential exploitation.

Create a due date rule

  1. On the Automation Pipelines page, click Add a New Rule and select Set Due Date.
  2. Enter a descriptive name for the rule, for example, Cloud Infrastructure Anomaly Warnings.
  3. Use the following boxes to configure the rule criteria:
    • Any of these types: The types of findings that the rule should check for. Available types include:
      • Application Code Vulnerability
      • Application Library Vulnerability
      • Container Image Vulnerability
      • Misconfiguration
      • Attack Path
      • Identity Risk
      • API Security Finding
    • Any of these tags or attributes: The resource tags or attributes that must match for the rule to apply.
  4. Set a due date for each severity level that requires one, effective from the discovery of a matching severity vulnerability.
  5. Click Save. The rule applies to new findings immediately and starts checking existing findings within the next hour.

Where due dates appear

When a finding has a due date, you can see it in these locations:

  • Explorer facets
  • Findings side panel
  • Notifications
  • Jira ticket descriptions
  • Reporting metrics (as an “overdue” Boolean) to identify teams or repositories with the most overdue vulnerabilities

Rule matching order

When Datadog identifies a vulnerability, it evaluates the vulnerability against your sequence of due date rules. Starting with the first rule, if there’s a match, Datadog sets a due date on the vulnerability for the specified duration and stops evaluating further. If no match occurs, Datadog moves to the next rule. This process continues until a match is found or all rules are checked without a match.

Removing due dates

When managing vulnerabilities, due dates can be removed under various conditions, such as:

  • The detection rule that triggered the vulnerability passes successfully.
  • The vulnerability is muted, either manually or automatically through a mute rule.
  • The due date rule associated with the vulnerability is disabled or deleted.
  • The associated due date rule is modified so that its criteria no longer match the vulnerability.

Further reading

Additional helpful documentation, links, and articles: