---
title: Frontier Group
description: Datadog, the leading service for cloud-scale monitoring.
breadcrumbs: >-
  Docs > Datadog Security > Cloud Security > Cloud Security Guides > Frontier
  Group
---

# Frontier Group

{% callout %}
##### Join the frontier group

The frontier group is an opt-in program where you get access to the newest AI features Datadog is developing. We'll only enable what we would be comfortable enabling for our own internal security team.

[SIGN UP](https://frontier-signup.vercel.app/)
{% /callout %}

## What's included{% #whats-included %}

### Ownership agent{% #ownership-agent %}

***Status:*** *available for frontier partners*Automated inference on who owns a particular resource and should be responsible for remediating it.

### 1-click CSPM remediation

***Status:*** *available for frontier partners*Automated (except human-in-the-loop) remediation on running cloud resources and the IaC definitions of those resources.

### Unified explorer{% #unified-explorer %}

***Status:*** *available for frontier partners*Misconfigurations, Identity Risks, and Attack Paths combined in a single explorer.

### CLI vulnerabilities{% #cli-vulnerabilities %}

***Status:*** *available for frontier partners*CI/CD vulnerability scans, command line integrations for agentic feedback.

### Container public accessibility{% #container-public-accessibility %}

***Status:*** *coming soon*More accurate public access evaluations of containers through EKS and runtime data.

### Critical assets{% #critical-assets %}

***Status:*** *coming soon*Automatic critical asset inference based on observability data, overridable through manual queries.

## Further reading{% #further-reading %}

- [Start tracking misconfigurations with Cloud Security Misconfigurations](https://docs.datadoghq.com/security/cloud_security_management/misconfigurations/)
- [Understand your identity landscape with Cloud Security Identity Risks](https://docs.datadoghq.com/security/cloud_security_management/identity_risks/)
- [Learn more about Cloud Security Vulnerabilities](https://docs.datadoghq.com/security/cloud_security_management/vulnerabilities/)
