Investigate Sensitive Data Issues


Sensitive Data Scanner is a stream-based, pattern matching service used to identify, tag, and optionally redact or hash sensitive data. When a sensitive data issue is found, you might have the following questions:

  • What sensitive data has been exposed?
  • What is the priority of the sensitive data exposure?
  • How severe is the issue in terms of spread and volume?
  • Where did the sensitive data come from?

The Sensitive Data Scanner’s Summary page categorizes and prioritizes sensitive data issues so that you can investigate, collaborate, and document your findings, and answer those questions.

The Sensitive Data Scanner summary page showing the number of sensitive data issues, the number of scanning rules enabled, and a list of issues

Triage sensitive data issues

Use the Summary page to see all sensitive data issues within the selected timeframe and start investigating issues.

In the Sensitive Data Issues section, filter by a priority level to see only issues with that priority level in the Issues Overview section. In the Cases section, filter by a case status to see issues associated to cases with that status in the Issues Overview section.

To investigate an issue:

  1. Click on the issue in the Issues Overview.
  2. In the issue panel, click View Recent Changes to navigate to Audit Trail and see if there are any recent configuration changes that caused the sensitive data issue.
  3. Click View All Logs to see in Log Explorer all logs matching the query.
    Click View All APM Spans to see in Trace Explorer all traces matching the query.
    Click View All RUM Events to see in RUM Explorer all RUM events matching the query.
    Click View All Events to see in Events Explorer all events matching the query.
    The issues panel showing a critical visa card scanner issue
  4. In the Blast Radius section:
    a. View the Top 10 services, hosts, and environments impacted by this sensitive data issue.
    b. Click on a service to see more information about the service in the Service Catalog.
    c. Click on a host to see more information about the host in the Infrastructure List page.
    The issues panel showing the top 10 impacted services
    If you want to modify the Scanning Rule that was used to detect the sensitive data issue, click Modify Rule at the top of the panel.

Additionally, you can also:

  • Use Case Management to track, triage, and investigate the issue, click Create Case at the top of the panel. Associated cases are surfaced in the Summary page.
  • Use Incident Management to create an incident, you can add the issue to an existing incident or declare a new incident. Click the Declare Incident dropdown menu to add the issue to an existing incident. Click Declare Incident to declare a new incident.
  • Use Audit Trail to see who may have accessed this sensitive data within Datadog, View in Audit Trail in the Users who accessed these events section.
The case page showing information about the security issue, the assignee and creator of the case, and a timeline of events

Further Reading