---
title: Cloud Security Supported Deployment Types
description: Datadog, the leading service for cloud-scale monitoring.
breadcrumbs: >-
  Docs > Datadog Security > Cloud Security > Setting up Cloud Security > Cloud
  Security Supported Deployment Types
---

# Cloud Security Supported Deployment Types

{% callout %}
# Important note for users on the following Datadog sites: app.ddog-gov.com

{% alert level="danger" %}
This product is not supported for your selected [Datadog site](https://docs.datadoghq.com/getting_started/site.md). ().
{% /alert %}

{% /callout %}

{% alert level="info" %}
Collecting events using Cloud Security affects your billing. For more information, see [Datadog Pricing](https://www.datadoghq.com/pricing/?product=cloud-security-management#products).
{% /alert %}

The following table summarizes the Cloud Security features available relative to each deployment type.

| Deployment type     | Agent Required (7.46+) | Misconfigurations | Vulnerabilities | Identity Risks | Agentless Scanning |
| ------------------- | ---------------------- | ----------------- | --------------- | -------------- | ------------------ |
| AWS Account         | yes                    | yes               | yes             | yes            |
| Azure Subscription  | yes                    | yes               | yes             | yes            |
| GCP Project         | yes                    | yes               | yes             | yes            |
| OCI Tenancy         | yes                    | yes               |
| Terraform           | yes                    |
| Docker              | yes                    | yes               |
| Kubernetes          | yes                    | yes               | yes             |
| Linux               | yes                    | yes               | yes             |
| Amazon ECS/EKS      | yes                    | yes               | yes             | yes            |
| Windows             | yes                    | yes               |
| AWS Fargate ECS/EKS | yes                    | ECS Fargate only  |

The following table summarizes the scope of coverage available relative to each Cloud Security feature.

| Resources monitored | Misconfigurations | Vulnerabilities | Identity Risks | Agentless scanning |
| ------------------- | ----------------- | --------------- | -------------- | ------------------ |
| AWS Resources/IAM   | yes               | yes             | yes            | yes                |
| Azure Resources/IAM | yes               | yes             | yes            | yes                |
| GCP Resources/IAM   | yes               | yes             | yes            | yes                |
| OCI Resources/IAM   | yes               | yes             |
| Kubernetes Cluster  | yes               |
| Docker Host         | yes               |
| Linux Host          | yes               | yes             | yes            |
| Windows Host        | yes               | yes             |
| Docker Container    | yes               |
| Container Image     | yes               | yes             |

**Note**: Cloud Security Misconfigurations additionally monitors common resources used in your cloud accounts that are running Windows and AWS Fargate, such as EC2 instances, RDS, S3, and ELB.
