Skip to content

Commit c5f5889

Browse files
maycmleeestherk15
andauthored
[DOCS-11525] Update Cloud SIEM landing page (#30784)
* update doc and add images * revert go.mod * edits * Apply suggestions from code review * update overview * add key features * Apply suggestions from code review * update to headers * revert go.mod * Apply suggestions from code review * update the rest to h4 * update risk insight image * add link * Apply suggestions from code review * Apply suggestions from code review * small edit * move key features * update key features * more key features updates that is no longer called key features * small edit * small edits * fix link * convert to h4s * apply suggestions * Apply suggestions from code review Co-authored-by: Esther Kim <[email protected]> * Update content/en/security/cloud_siem/_index.md --------- Co-authored-by: Esther Kim <[email protected]>
1 parent e973dec commit c5f5889

File tree

8 files changed

+204
-16
lines changed

8 files changed

+204
-16
lines changed

content/en/security/cloud_siem/_index.md

Lines changed: 204 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -51,33 +51,221 @@ further_reading:
5151
---
5252

5353
{{< learning-center-callout header="Join an enablement webinar session" hide_image="true" btn_title="Sign Up" btn_url="https://www.datadoghq.com/technical-enablement/sessions/?tags.topics-0=Security">}}
54-
Learn how Datadog Cloud SIEM and Cloud Security elevate your organization's threat detection and investigation for dynamic, cloud-scale environments.
54+
Learn how Datadog Cloud SIEM and Cloud Security elevate your organization's threat detection and investigation for dynamic, cloud-scale environments.
5555
{{< /learning-center-callout >}}
5656

5757
## Overview
5858

59-
Datadog Cloud SIEM (Security Information and Event Management) unifies developer, operation, and security teams on one platform. Use a single dashboard to display DevOps content, business metrics, and security insights. Cloud SIEM detects threats to your applications and infrastructure, such as targeted attacks, communications from threat intel-listed IP addresses, and insecure configurations, in real time. Notify your team of these security issues by email, Slack, Jira, PagerDuty, or webhooks.
59+
Datadog Cloud SIEM (Security Information and Event Management) is a security data analysis and correlation system. It enables your entire security operations team to view, detect, investigate, and respond to security issues. Leveraging Datadog's scalable platform, Cloud SIEM ingests telemetry from both cloud and on‑premises systems using the Datadog Agent and API-based integrations.
6060

61-
{{< img src="security/security_monitoring/cloud_siem_overview_2.png" alt="The Cloud SIEM home page showing the Security Overview section with widgets for important signals, suspicious actors, impacted resources, threat intel, and signal trends" >}}
61+
Effective security response requires speed, context, insight, and automation. Cloud SIEM continuously analyzes incoming data to detect threats, generate actionable security signals, and correlate them across multiple sources. This empowers your team to investigate incidents and respond quickly.
6262

63-
Threats are surfaced in Datadog as Security Signals and can be correlated and triaged in the [Security Signals Explorer][1]. Security Signals are generated by Datadog Cloud SIEM with [Detection Rules][2]. Detection Rules detect threats across different sources and are available out of the box for immediate use. You can clone any of the provided detection rules to change the configuration. You can also add a [new rule][3] from scratch to fit your specific use case.
63+
To keep your team on top of the latest attacks, Datadog also has a team of threat researchers who analyze petabytes of telemetry across cloud and on-premises systems to identify emerging threats and attacker behaviors. See [Datadog Security Labs][1] to read articles about their recent investigations.
64+
65+
### Security and observability
66+
67+
Cloud SIEM embeds both cloud and on-premises telemetry directly into security workflows to accelerate investigation and response. And with a shared platform that brings DevOps and Security teams together, organizations can break down silos and respond to threats collaboratively and efficiently.
68+
69+
### Flexible cost control for security data
70+
71+
As your organization scales, controlling the ingestion cost of security logs without compromising visibility is critical. Cloud SIEM is integrated with Datadog Log Management so you can choose the appropriate retention and querying capability for your security logs. This flexibility helps you balance cost efficiency with your threat detection needs.
72+
73+
Store logs using one of the available options:
74+
- [Standard indexing][6] for logs that need to be queried frequently with the most compute.
75+
- [Flex Logs][7] for logs that need to be retained long-term, but sometimes need to be queried urgently.
76+
- [Log Archives][8] for logs that are infrequently queried and need to be stored long-term.
77+
78+
### Guided security data onboarding
79+
80+
Cloud SIEM [Content Packs][9] are a curated set of Datadog integrations designed for security teams. Each content pack has instructions on how to configure the integration and what is included, such as detection rules, out-of-the-box interactive dashboards, parsers, and SOAR workflows. Content Packs highlight actionable insights specific to each integration to help you investigate security issues.
81+
82+
### Content pack health monitoring
83+
84+
After a content pack is activated, it gives you the integration's health status and provides troubleshooting steps if something goes wrong so you can get back up and operational as fast as possible.
85+
86+
### Log search and analysis
87+
88+
Build searches in the Log Explorer using facets or by clicking fields directly in the logs. Or use Bits AI and natural language search to find important security events. With built-in group-by and table lookup functions as well as pattern analysis and visualizations, security teams can get security insights from their data. See [Log Explorer][11] and [Log Search Syntax][10] for more information.
6489

6590
## Get started
6691

67-
{{< whatsnext desc="See the following documents to get started with Cloud SIEM:" >}}
68-
{{< nextlink href="/getting_started/cloud_siem/">}}Getting started with Cloud SIEM guide{{< /nextlink >}}
69-
{{< nextlink href="/security/cloud_siem/guide/aws-config-guide-for-cloud-siem/">}}Configure AWS for Cloud SIEM{{< /nextlink >}}
70-
{{< nextlink href="/security/cloud_siem/guide/google-cloud-config-guide-for-cloud-siem/">}}Configure Google Cloud for Cloud SIEM{{< /nextlink >}}
71-
{{< nextlink href="/security/cloud_siem/guide/azure-config-guide-for-cloud-siem/">}}Configure Azure for Cloud SIEM{{< /nextlink >}}
72-
{{< nextlink href="/integrations/">}}Search for specific integrations to set up log collection for them{{< /nextlink >}}
73-
{{< nextlink href="/security/default_rules#cat-cloud-siem-log-detection">}}Start using out-of-the-box Cloud SIEM detection rules{{< /nextlink >}}
74-
{{< nextlink href="/security/detection_rules">}}Create your own custom detection rules{{< /nextlink >}}
75-
{{< /whatsnext >}}
92+
If you don't already have a Datadog account, sign up for a [free trial][2]. After you log in to your Datadog account:
93+
94+
1. Navigate to [Cloud SIEM][3].
95+
1. Click **Enable Cloud SIEM**.
96+
1. Follow the onboarding steps.
97+
98+
See the [Getting Started Guide][4] for more detailed setup instructions.
99+
100+
## Cloud SIEM Overview page
101+
102+
Navigate to the [Cloud SIEM Overview page][3]. Use this page to see key security insights and act on common workflows for security analysts, security and detection engineers, and Security Operations Center (SOC) managers. From the Overview page, you can:
103+
- Access important signals, open cases, and high-risk entities.
104+
- Complete onboarding tasks and review content‑pack health.
105+
- View and investigate top signals by geography or internet service provider (ISP).
106+
- Analyze signals and rules by MITRE ATT&CK tactics.
107+
- Track detection performance (Mean Time to Detect (MTTD), false‑positive rates).
108+
- Read the latest [Security Labs][1] research and release notes.
109+
110+
Click **Customize Page** to reorder or hide modules so you can see what is important to you.
111+
112+
Learn more about each Cloud SIEM Overview page section below.
113+
114+
### Security coverage
115+
116+
{{< img src="security/security_monitoring/landing/01_security_coverage.png" alt="Security coverage sections showing 11 active and 1 broken content packs and a bar graph of logs analyzed by Cloud SIEM" style="width:100%;" >}}
117+
118+
Remain aware of any data processing issues or coverage gaps.
119+
120+
#### Enabled content packs and integrations
121+
122+
View enabled content packs and integrations across the critical categories to provide comprehensive security coverage. Hover over each section of the horizontal bar to see which content packs are enabled in each category.
123+
124+
#### Content pack and logs health KPIs
125+
126+
See whether any content packs or integrations are in warning or broken states so that you can resolve any coverage gaps. Click a status tile to view the affected content packs.
127+
128+
#### Logs analyzed
129+
130+
View logging trends across your top log sources and identify any unusual spikes or drops. Click on the legend at the bottom to explore trends on a per source basis.
131+
132+
### Important signals and cases
133+
134+
{{< img src="security/security_monitoring/landing/02_important_signals_cases.png" alt="" style="width:100%;" >}}
135+
136+
See important events happening in your environment, such as:
137+
138+
#### Recent open signals grouped by rule
139+
140+
See signals grouped by rule name and sorted by severity to get an overview of the most important signals in your environment. Click on a signal or a severity pill to see more details in a filtered view in the Signal Explorer.
141+
142+
#### Recent open security cases
143+
144+
Use [Case Management][5] to track signals that require further analysis. View active security cases in your environment and click a case to see more details.
145+
146+
### Risk insights
147+
148+
{{< img src="security/security_monitoring/landing/03_risk_insights.png" alt="" style="width:100%;" >}}
149+
150+
Review the risky entities in your environment.
151+
152+
#### Top risky entities
153+
154+
See the entities with the highest risk scores. Click an entity to view more details and take action.
155+
156+
#### Entity type breakdown
157+
158+
View the most common entity types in your environment. Click a pie chart wedge to filter the list of entities by type.
159+
160+
#### Entities risk score breakdown
161+
162+
View entities by severity. Click a severity tile to see a list of entities with that severity.
163+
164+
### Threat map
165+
166+
{{< img src="security/security_monitoring/landing/04_threat_map.png" alt="" style="width:100%;" >}}
167+
168+
Get insights from where the signals in your environment are getting generated.
169+
170+
#### Top IPs by country distribution
171+
172+
See which IPs are generating the most signals with a breakdown of important and less important signals. Also, use the map to see a list of signals by country.
173+
174+
#### Signals by country
175+
176+
See the proportional breakdown of where signals originate. Click a pie chart wedge to filter by country and state or province, and identify signals from unexpected locations.
177+
178+
#### Signals by ISP provider
179+
180+
Review which ISPs are sending signals. Click on a pie chart wedge to scope down by provider and location.
181+
182+
### Security overview
183+
184+
{{< img src="security/security_monitoring/landing/05_security_overview.png" alt="" style="width:100%;" >}}
185+
186+
A high-level overview of all signals.
187+
188+
#### Signal Distribution
189+
190+
On the left side of the section, see signals grouped by severity and trend over the selected time window.
191+
On the right side, see a break down of signal activity by severity, source, and resolution. Click on a node in the sankey diagram to see signals in the Signal Explorer filtered to the specifics of that node.
192+
193+
#### Mean Time to Respond to Signals
194+
195+
See KPIs of how quickly your team responds. Click a severity tile to view signals set to `under review` or `archive` and filtered to the selected severity.
196+
197+
### MITRE ATT&CK coverage
198+
199+
{{< img src="security/security_monitoring/landing/06_mitre_coverage.png" alt="" style="width:100%;" >}}
200+
201+
Detection rule coverage and signal activity by MITRE ATT&CK tactics and techniques.
202+
203+
#### Techniques with at least 1 rule
204+
205+
See how many techniques are covered by the detection rules enabled in your environment.
206+
207+
#### Rule density KPIs
208+
209+
See how many techniques have high, medium, or low density or no rules at all. Click on a tile to view a filtered MITRE map.
210+
211+
#### Signals per tactic view
212+
213+
See which MITRE ATT&CK tactics are generating signals. Click a pie chart wedge to view the Signal Explorer filtered by that tactic. Click the dropdown and select **Rules count** to see which tactics have the most rules mapped to it. When viewing by rule count, clicking on a pie chart wedge creates a detection rule explorer view filtered by that tactic.
214+
215+
#### Signals per technique view
216+
217+
See which MITRE ATT&CK techniques are generating signals. Click on a pie chart wedge to view the Signal Explorer filtered by technique. Click the dropdown and select **Rules count** to see which techniques have the most rules mapped to it. When viewing by rule count, click on a pie chart wedge to see the detection rule explorer filtered by that technique.
218+
219+
### Detection rules performance
220+
221+
{{< img src="security/security_monitoring/landing/07_detection_rule_performance.png" alt="" style="width:100%;" >}}
222+
223+
Gain a deeper understanding of detection rule performance. This section works best if you triage signals in Cloud SIEM.
224+
225+
#### MTTD KPIs for Cloud SIEM
226+
227+
See the Mean Time to Detect (MTTD) across all signals. The tiles below show MTTD for critical, high, and medium signals. Click a tile to see signals with that severity in the Signal Explorer.
228+
229+
#### Signal activity
230+
231+
View signal trends over the selected time window. Select the severity checkboxes at the bottom of the bar graph to scope by severity, which can be useful for identifying unusual spikes or drops.
232+
233+
#### Rules by important signal change (1 week)
234+
235+
See which rules have increased important signal activity compared to the week prior. Click a rule name to view signals in the Signal Explorer filtered by that rule name.
236+
237+
#### Signals by severity change (1 week)
238+
239+
View how the severities across all signals have changed compared to the week prior. Click on a severity to view signals with that severity in the Signal Explorer.
240+
241+
#### Important signals by archived reason
242+
243+
See how many signals were archived by archive reason. Click on a reason to view the Signal Explorer filtered by that archive reason.
244+
245+
#### Rules archived with true positive (malicious)
246+
247+
See which rules were archived as `True Positive: Malicious`. Click on a rule to view the signals in the Signal Explorer.
248+
249+
#### Rules archived with true positive (benign)
250+
251+
See which rules were archived as `True Positive: Benign`. Click on a rule to view the signals in the Signal Explorer.
252+
253+
#### Rules by false positive rate
254+
255+
See which rules are the noisiest by calculating the percentage of signals that are marked as false positive out of all the signals generated by a rule. Click on a rule to view signals for that rule in the Signal Explorer.
76256

77257
## Further reading
78258

79259
{{< partial name="whats-next/whats-next.html" >}}
80260

81-
[1]: /security/cloud_siem/investigate_security_signals
82-
[2]: /security/default_rules#cat-cloud-siem
83-
[3]: /security/detection_rules
261+
[1]: https://securitylabs.datadoghq.com/
262+
[2]: https://www.datadoghq.com/product/cloud-siem/
263+
[3]: https://app.datadoghq.com/security/home?
264+
[4]: /getting_started/security/cloud_siem/
265+
[5]: /security/cloud_siem/investigate_security_signals/#case-management
266+
[6]: /logs/log_configuration/indexes
267+
[7]: /logs/log_configuration/flex_logs/
268+
[8]: /logs/log_configuration/archives/
269+
[9]: /security/cloud_siem/content_packs/
270+
[10]: /logs/explorer/search_syntax/
271+
[11]: /logs/explorer/
198 KB
Loading
330 KB
Loading
342 KB
Loading
652 KB
Loading
731 KB
Loading
622 KB
Loading
395 KB
Loading

0 commit comments

Comments
 (0)