---
isPrivate: true
title: Security Guides
description: Datadog, the leading service for cloud-scale monitoring.
breadcrumbs: Docs > Datadog Security > Security Guides
---

# Security Guides

- [AWS Fargate Configuration Guide for Datadog Security](https://docs.datadoghq.com/security/guide/aws_fargate_config_guide)
- [Bring Your Own Threat Intelligence](https://docs.datadoghq.com/security/guide/byoti_guide)

- [Security Findings Schema Reference](https://docs.datadoghq.com/security/guide/findings-schema/)

- [Getting Started with Cloud SIEM](https://docs.datadoghq.com/getting_started/cloud_siem)
- [Automate the remediation of detected threats with Cloud SIEM](https://docs.datadoghq.com/security/cloud_siem/guide/automate-the-remediation-of-detected-threats)
- [AWS Configuration Guide for Cloud SIEM](https://docs.datadoghq.com/security/cloud_siem/guide/aws-config-guide-for-cloud-siem)
- [Google Cloud Configuration Guide for Cloud SIEM](https://docs.datadoghq.com/security/cloud_siem/guide/google-cloud-config-guide-for-cloud-siem/)
- [Azure Configuration Guide for Cloud SIEM](https://docs.datadoghq.com/security/cloud_siem/guide/azure-config-guide-for-cloud-siem/)
- [Monitor Authentication Logs for Security Threats](https://docs.datadoghq.com/security/cloud_siem/guide/monitor-authentication-logs-for-security-threats)
- [Security Filters with the Cloud SIEM API](https://docs.datadoghq.com/security/cloud_siem/guide/how-to-setup-security-filters-using-cloud-siem-api)

- [Automate open source risk reduction with Datadog SCA](https://docs.datadoghq.com/security/code_security/guides/automate_risk_reduction_sca/)

- [First Steps for Cloud Security](https://docs.datadoghq.com/getting_started/cloud_security_management)
- [Cloud Security Agent Variables](https://docs.datadoghq.com/security/cloud_security_management/guide/agent_variables)

- [Writing Custom Cloud Security Misconfigurations Rules with Rego](https://docs.datadoghq.com/security/cloud_security_management/guide/writing_rego_rules)
- [How Datadog Determines if Resources are Publicly Accessible](https://docs.datadoghq.com/security/cloud_security_management/guide/public-accessibility-logic)
- [Use Filters to Exclude Resources from Evaluation](https://docs.datadoghq.com/security/cloud_security_management/guide/resource_evaluation_filters)
- [View a Misconfiguration's Related Logs](https://docs.datadoghq.com/security/cloud_security_management/guide/related-logs)

- [First steps with App and API Protection](https://docs.datadoghq.com/getting_started/application_security/)
- [Standalone App and API Protection](https://docs.datadoghq.com/security/application_security/guide/standalone_application_security/)
- [Managing account theft with AAP](https://docs.datadoghq.com/security/application_security/guide/manage_account_theft_appsec/)

- [Proactively block crypto mining threats with Active Protection](https://docs.datadoghq.com/security/workload_protection/guide/active-protection)
- [Best Practices for Fine-Tuning Workload Protection Security Signals](https://docs.datadoghq.com/security/workload_protection/guide/tuning-rules)
- [Writing custom rule expressions](https://docs.datadoghq.com/security/workload_protection/secl_auth_guide)
- [Threat Detection for Linux Without eBPF Support](https://docs.datadoghq.com/security/workload_protection/guide/ebpf-free-agent)

- [Investigate Sensitive Data Findings](https://docs.datadoghq.com/security/sensitive_data_scanner/guide/investigate_sensitive_data_findings)
