Getting Started with Cloud SIEM
Overview
Datadog Cloud SIEM detects real-time threats to your application and infrastructure. These threats can include a targeted attack, a threat intel listed IP communicating with your systems, or an insecure configuration. Once detected, a signal is generated and a notification can be sent out to your team.
This guide walks you through best practices for getting started with Cloud SIEM.
Phase 1: Setup
Configure log ingestion to collect logs from your sources. Review Best Practices for Log Management.
You can use out-of-the-box integration pipelines to collect logs for more than
800 integrations, or create custom log pipelines to send:
Enable Cloud SIEM.
Select and configure Content Packs, which provide out-of-the-box content for critical security log sources.
Select and configure additional log sources you want Cloud SIEM to analyze.
Click Activate. A custom Cloud SIEM log index (cloud-siem-xxxx
) is created.
If the Cloud SIEM setup page shows the warning “The Cloud SIEM index is not in the first position”, follow the steps in the Reorder the Cloud SIEM index section.
Reorder the Cloud SIEM index
Click Reorder index in Logs Configuration.
Confirm the modal title says “Move cloud-siem-xxxx to…” and that the cloud-siem-xxxx
text in the index column is light purple.
- To select the new placement of your index, click the top line of the index where you want
cloud-siem-xxxx
to go. For example, if you want to make the cloud-siem-xxxx
index the first index, click on the line above the current first index. The new position is highlighted with a thick blue line.
The text confirms the position selected: “Select the new placement of your index: Position 1”. Click Move.
Review the warning text. If you are satisfied with the change, click Reorder.
Review the index order and confirm that the cloud-siem-xxxx
index is where you want it. If you want to move the index, click the Move to icon and follow steps 3 to 5.
Navigate back to the Cloud SIEM setup page.
The Cloud SIEM index should be in the first index position now. If the setup page still displays a warning about the index position, wait a few minutes and refresh the browser.
After the index is moved to the first index position, review the settings and statuses for the Content Packs and other log sources. For each integration that shows a warning or an error, click on the integration and follow the instructions to fix it.
Phase 2: Signal exploration
Review the out-of-the-box detection rules that begin detecting threats in your environment immediately. Detection rules apply to all processed logs to maximize detection coverage. See the detection rules documentation for more information.
Explore security signals. When a threat is detected with a detection rule, a security signal is generated. See the security signals documentation for more information.
- Set up notification rules to alert when signals are generated. You can alert using Slack, Jira, email, webhooks, and other integrations. See the notification rules documentation for more information.
- Subscribe to the weekly threat digest reports to begin investigation and remediation of the most important security threats discovered in the last seven days.
Phase 3: Investigation
- Explore the Investigator for faster remediation. See the Investigator documentation for more information.
- Use out-of-the-box-dashboards or create your own dashboards for investigations, reporting, and monitoring.
Phase 4: Customization
- Set up suppression rules to reduce noise.
- Create custom detection rules. Review Best Practices for Creating Detection Rules.
Further Reading
Additional helpful documentation, links, and articles: