This product is not supported for your selected Datadog site. ().
Agentless Scanning provides visibility into vulnerabilities that exist within your cloud infrastructure, without requiring you to install the Datadog Agent. To learn more about Agentless Scanning’s capabilities and how it works, see the Agentless Scanning docs.
Prerequisites
Before setting up Agentless Scanning, ensure the following prerequisites are met:
Remote Configuration: Remote Configuration is required to enable Datadog to send information to Agentless scanners, such as which cloud resources to scan.
API and Application Keys:
An API key with Remote Configuration enabled is required for scanners to report scan results to Datadog.
An Application key with either Integrations Manage or Org Management permissions is required to enable scanning features through the Datadog API.
Cloud permissions: The Agentless Scanning instance requires specific permissions to scan hosts, host images, container registries, and functions. These permissions are automatically applied as part of the installation process and are strictly limited to the minimum permissions required to perform the necessary scans, following the principle of least privilege.
AWS scanning permissions
Scanning permissions:
ebs:GetSnapshotBlock
ebs:ListChangedBlocks
ebs:ListSnapshotBlocks
ec2:CopySnapshot
ec2:CreateSnapshot
ec2:CreateTags
ec2:DeleteSnapshot
ec2:DeregisterImage
ec2:DescribeSnapshotAttribute
ec2:DescribeSnapshots
ec2:DescribeVolumes
ecr:BatchGetImage
ecr:GetAuthorizationToken
ecr:GetDownloadUrlForLayer
kms:CreateGrant
kms:Decrypt
kms:DescribeKey
lambda:GetFunction
lambda:GetLayerVersion
Only when Sensitive Data Scanning (DSPM) is enabled:
Terraform: For AWS, Azure, and GCP using the Terraform module directly.
Quick start
Designed for new users, the quick start workflow offers an efficient setup process for Cloud Security, enabling immediate monitoring of AWS resources. It uses AWS CloudFormation to automate the configuration.
Quick start setup guide
Designed for new users, the quick start workflow offers an efficient setup process for Cloud Security, enabling immediate monitoring of AWS resources. It uses AWS CloudFormation to automate the configuration, and includes the Cloud Security features: Misconfigurations, Identity Risks (CIEM), and Vulnerability Management.
This article provides instructions for the new user quick start workflow that uses AWS CloudFormation to set up Agentless Scanning.
For existing users who want to add a new AWS account or enable Agentless Scanning on an existing integrated AWS account, see the instructions for
Terraform or AWS CloudFormation.
Sensitive Data Scanner for cloud storage is in Limited Availability. Request Access to enroll.
Choose whether to enable Sensitive Data Scanner for cloud storage. This automatically catalogs and classifies sensitive data in Amazon S3 resources.
Click Launch CloudFormation Template. A new window opens, displaying the AWS CloudFormation screen. Use the provided CloudFormation template to create a stack. The template includes the IAM permissions required to deploy and manage Agentless scanners.
Update the CloudFormation stack
Datadog recommends updating the CloudFormation stack regularly, so you can get access to new features and bug fixes as they get released. To do so, follow these steps:
Log in to your AWS console and go to the CloudFormation Stacks page.
Select the DatadogIntegration-DatadogAgentlessScanning-… CloudFormation sub-stack, click Update, then click Update nested stack.
Click Replace existing template.
In the following S3 URL: https://datadog-cloudformation-template-quickstart.s3.amazonaws.com/aws/<VERSION>/datadog_agentless_scanning.yaml, replace <VERSION> with the version found in aws_quickstart/version.txt. Paste that URL into the Amazon S3 URL field.
Click Next to advance through the next several pages without modifying them, then submit the form.
AWS Cloudformation
Use the AWS CloudFormation template to create a CloudFormation stack. The template includes the IAM permissions required to deploy and manage Agentless scanners.
AWS CloudFormation setup guide
If you’ve already set up Cloud Security and want to add a new cloud account or enable Agentless Scanning on an existing integrated AWS account, you can use either Terraform or AWS CloudFormation. This article provides detailed instructions for the AWS CloudFormation approach.
If you're setting up Cloud Security for the first time, you can follow the quick start workflow, which also uses AWS CloudFormation to enable Agentless Scanning.
Sensitive Data Scanner for cloud storage is in Limited Availability. Request Access to enroll.
At the bottom of the AWS section, click Add AWS accounts by following these steps. The Add New AWS Account(s) dialog is displayed.
Select the AWS region where you want to create the CloudFormation stack.
Select an API key that has [Remote Configuration][3] enabled.
Choose whether to enable Sensitive Data Scanner for cloud storage. This automatically catalogs and classifies sensitive data in Amazon S3 resources.
Click Launch CloudFormation Template. A new window opens, displaying the AWS CloudFormation screen. Use the provided CloudFormation template to create a stack. The template includes the IAM permissions required to deploy and manage Agentless scanners.
Click the AWS account where you want to deploy the Agentless scanner, which opens the side panel.
On the Features tab, click Configure Agentless Scanning or Manage to open the Agentless Scanning Setup modal.
In the How would you like to set up Agentless Scanning? section, select CloudFormation.
Select an API key that has [Remote Configuration][3] enabled.
Toggle the features you want to enable, such as Vulnerability Management or Sensitive Data Scanner.
Click Launch CloudFormation Template. A new window opens, displaying the AWS CloudFormation screen. Use the provided CloudFormation template to create a stack.
Click Done.
Update the CloudFormation stack
Datadog recommends updating the CloudFormation stack regularly, so you can get access to new features and bug fixes as they get released. To do so, follow these steps:
Log in to your AWS console and go to the CloudFormation Stacks page.
Select the DatadogIntegration-DatadogAgentlessScanning-… CloudFormation sub-stack, click Update, then click Update nested stack.
Click Replace existing template.
In the following S3 URL: https://datadog-cloudformation-template-quickstart.s3.amazonaws.com/aws/<VERSION>/datadog_agentless_scanning.yaml, replace <VERSION> with the version found in aws_quickstart/version.txt. Paste that URL into the Amazon S3 URL field.
Click Next to advance through the next several pages without modifying them, then submit the form.
AWS CloudFormation StackSet (Multi-Account)
For AWS Organizations with multiple accounts, use a CloudFormation StackSet to deploy the Agentless Scanning delegate role across all member accounts. This approach automates the onboarding process and ensures new accounts added to your Organization are automatically configured.
AWS CloudFormation StackSet setup guide
This setup deploys the delegate role required for cross-account scanning across your AWS Organization or specific Organizational Units (OUs).
Enter a StackSet name (for example, DatadogAgentlessScanningStackSet).
Configure the required parameters:
ScannerInstanceRoleARN: The ARN of the IAM role attached to your Agentless scanner instances.
The ScannerInstanceRoleARN must be the exact ARN of the scanner instance role (for example, arn:aws:iam::123456789012:role/DatadogAgentlessScannerRole). Using a root ARN such as arn:aws:iam::123456789012:root does not work.
The ScannerInstanceRoleARN establishes a trust relationship between the delegate role (created in target accounts) and your scanner instances (already running in the central account). This enables cross-account scanning where:
The scanner runs in Account A.
The delegate role exists in Accounts B, C, D (deployed through the StackSet).
The scanner assumes the delegate roles to scan resources in those accounts.
Set Deployment targets to deploy across your Organization or specific OUs.
Enable Automatic deployment to automatically configure new accounts added to your Organization.
Select a single region for deployment (the IAM role is global and only needs to be deployed once per account).
Review and submit the StackSet.
After the StackSet deploys successfully, the member accounts are configured to allow cross-account scanning from your central scanner account.
GCP Cloud Shell
Use Google Cloud Shell to set up Agentless Scanning for your GCP projects. This method downloads a setup script that you can review, and then runs it to wrap the Terraform Datadog Agentless Scanner module for GCP, making the installation process straightforward and without needing to manage Terraform directly.
GCP Cloud Shell setup guide
If you’ve already set up Cloud Security and want to enable Agentless Scanning on an existing integrated GCP project, you can use Google Cloud Shell for a guided setup experience.
After the command completes successfully, return to the Datadog setup page and click Done.
Azure Resource Manager
Use the Azure Resource Manager template to deploy the Agentless Scanner. The template includes the role definitions required to deploy and manage Agentless scanners.
Azure Resource Manager setup guide
If you’ve already set up Cloud Security and want to add a new Azure subscription or enable Agentless Scanning on an existing integrated Azure subscription, you can use either Terraform or Azure Resource Manager. This article provides detailed instructions for the Azure Resource Manager approach.
(Optional) To enable detection of misconfigurations, toggle Resource Scanning to the on position.
Expand the list of Azure subscriptions and locate the subscription where you want to deploy the Agentless scanner.
Click the Enable button under Vulnerability Scanning.
The Vulnerability Scanning dialog is displayed. Toggle Vulnerability Scanning to the on position.
Under How would you like to set up Agentless Scanning?, select Azure Resource Manager.
Click Launch Azure Resource Manager to be redirected to the Azure portal.
Azure portal
Log in to the Azure portal. The template creation form is displayed.
Select the subscription and the resource group in which the Agentless scanners are to be deployed. Datadog recommends that you deploy the Datadog Agentless Scanner in a dedicated resource group.
In Subscriptions to scan, select all the subscriptions you want to scan.
Enter your Datadog API Key, select your Datadog Site, and fill out the remainder of the form.
Click on Review + create.
Enable Agentless Scanning for your Azure subscriptions
Complete the following steps to enable Agentless Scanning for your Azure subscriptions:
(Optional) To enable detection of misconfigurations, toggle Resource Scanning to the on position.
Expand the list of Azure subscriptions and locate the subscription where you want to deploy the Agentless scanner.
Click the Enable button under Vulnerability Scanning.
The Vulnerability Scanning dialog is displayed. Toggle Vulnerability Scanning to the on position.
Under How would you like to set up Agentless Scanning?, select Azure Resource Manager.
Click Launch Azure Resource Manager to be redirected to the Azure portal.
Azure portal
Log in to the Azure portal. The template creation form is displayed.
Select the subscription and the resource group in which the Agentless scanners are to be deployed. Datadog recommends that you deploy the Datadog Agentless Scanner in a dedicated resource group.
In Subscriptions to scan, select all the subscriptions you want to scan.
Enter your Datadog API Key, select your Datadog Site, and fill out the remainder of the form.
If you're setting up Cloud Security for the first time, you can follow the quick start workflow, which uses AWS CloudFormation to enable Agentless Scanning.
After completing the setup, you can verify that Agentless Scanning is working correctly by checking for scan results in Datadog. Results typically appear after the first scan cycle completes.
View scan results in the following locations:
For host and container vulnerabilities: CSM Vulnerabilities Explorer. To view only vulnerabilities detected by Agentless Scanning, use the filter origin:"Agentless scanner" in the search bar.
To exclude hosts, containers, and functions from scans, apply the tag DatadogAgentlessScanner:false to each resource. For detailed instructions, refer to the Resource Filters documentation.
If required, use filters to find the account you want to stop agentless scanning for. Click the account to open the side panel that contains its settings.
On the Features tab, click Configure Agentless Scanning or Manage to open the Agentless Scanning Setup modal.
Under How would you like to set up Agentless scanning?, click Terraform.
Under Enable Features, beside Enable Agentless Vulnerability management, switch the toggle to the off position.
Expand the account containing the project where you want to disable Agentless scanning.
Beside the Enabled label, click the Edit button () to open the Vulnerability Scanning modal.
Beside Vulnerability Scanning, switch the toggle to the off position.
Click Done.
Uninstall Agentless scanning
To uninstall Agentless Scanning, remove the scanner module from your Terraform code. For more information, see the Terraform module documentation.
To uninstall Agentless Scanning, log in to your AWS console and delete the CloudFormation stack created for Agentless Scanning.
To uninstall Agentless Scanning that was set up using Google Cloud Shell, run the same setup command you used during installation, replacing deploy with destroy at the end. For example:
You can review the [setup script source][21] before running the command.
To uninstall Agentless Scanning, log in to your Azure subscription. If you created a dedicated resource group for the Agentless scanner, delete this resource group along with the following Azure role definitions:
Datadog Agentless Scanner Role
Datadog Agentless Scanner Delegate Role
If you did not use a dedicated resource group, you must manually delete the scanner resources, which can be identified by the tags Datadog:true and DatadogAgentlessScanner:true.
Further reading
Additional helpful documentation, links, and articles: