Cloud Security Agentless Scanning
This product is not supported for your selected
Datadog site. (
).
Overview
Agentless Scanning provides visibility into vulnerabilities that exist within your AWS, Azure, and GCP cloud infrastructure, without requiring you to install the Datadog Agent. Datadog recommends enabling Agentless Scanning as a first step to gain complete visibility into your cloud resources, and then installing the Datadog Agent on your core assets over time for deeper security and observability context.
Agentless Scanning excludes resources that have the Datadog Agent installed.
How it works
The following diagram illustrates how Agentless Scanning works:
- Datadog schedules automated scans in 12-hour intervals and sends the resources to scan through Remote Configuration.
- For serverless functions (such as AWS Lambda), the scanners fetch the function’s code.
- The scanner creates snapshots of volumes used in running VM instances. Using the snapshots or the function code, the scanner generates an SBOM (a list of packages and dependencies).
- The SBOM and host metadata are transmitted to Datadog. All other data—including snapshots, disk contents, and container images—remains in your infrastructure. Snapshots are deleted.
- Datadog uses the SBOM to identify known vulnerabilities in your resources.
This architecture provides:
- Data privacy: Your disk contents, container images, and sensitive data stay within your cloud account. Only package metadata (the SBOM) is transmitted to Datadog.
- Data residency: No data crosses an account boundary into Datadog’s infrastructure, simplifying compliance with data sovereignty requirements.
- Compliance: Auditors can verify that scanning data remains within your perimeter.
For more information on data privacy, see What data is sent to Datadog.
- The scanner operates as a separate virtual machine within your infrastructure, ensuring minimal impact on existing systems and resources.
- For AWS, scanner instances automatically scale based on workload. When there are no resources to scan, scanners scale to zero to minimize cloud provider costs.
- The scanner securely collects a list of packages from your hosts without transmitting any confidential or private personal information outside your infrastructure.
- The scanner limits its use of the cloud provider API to prevent reaching any rate limit, and uses exponential backoff if needed.
- Scanner instances are automatically rotated every 24 hours, ensuring they run the latest images.
What data is sent to Datadog
Rather than copying disk snapshots outside of your environment for analysis, to keep your data private, Datadog deploys lightweight scanning infrastructure inside your cloud account. Agentless Scanning creates snapshots of your resources and analyzes them locally, deleting the snapshots after the analyses are complete. It only sends to Datadog the resulting software bill of materials (SBOM), which contains a list of packages and dependencies. Your raw data, disk contents, and container images never leave your environment.
The Agentless scanner uses the OWASP cycloneDX format to transmit a list of packages to Datadog. No confidential or private personal information is ever transmitted outside of your infrastructure.
Datadog does not send:
- System and package configurations
- Encryption keys and certificates
- Logs and Audit Trails
- Sensitive business data
Cloud service provider cost
Because Agentless Scanning runs inside your cloud account, the compute and networking costs appear on your cloud provider bill. While vendors that scan in their own infrastructure bundle compute costs into their SaaS fees, keeping data in your environment means that you see the infrastructure cost directly.
To reduce costs:
- Deploy a scanner in each region where you have more than 150 hosts. A regional scanner avoids cross-region data transfer, which is more cost-effective than scanning those hosts from a remote region.
- Use the recommended configuration with Terraform to deploy one scanner per region.
- For large multi-region deployments, see Deploying Agentless Scanning for guidance on choosing a deployment topology.
Restrict scanner access
Scanner instances require permissions to create and copy snapshots and describe volumes. Datadog recommends following the following guidelines to keep your scanners secure:
- Restrict access to scanner instances to administrative users.
- Set scanner permissions to follow the principle of least privilege, limited to the minimum required for scanning.
- Encrypt all data transmission between the scanner and Datadog with HTTPS.
- Enable unattended security updates, and rotate instances automatically every 24 hours.
- Don’t allow inbound access to scanner instances (security group restricted).
Cloud Storage scanning
You can enable Sensitive Data Scanner for your Agentless Scanning resources during deployment or after setup. Sensitive Data Scanner catalogs and classifies sensitive data in your cloud storage (such as Amazon S3 buckets). It only reads data stores and their files in your environment, without sending any sensitive data to Datadog.
On-demand scanning
By default, Agentless Scanning automatically scans your resources every 12 hours. For AWS, you can also trigger an immediate scan of a specific resource (host, container, Lambda function, or S3 bucket) using the On-Demand Scanning API. For more information, see the On-Demand Scanning API documentation.
Further reading
Additional helpful documentation, links, and articles: