Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
1 change: 1 addition & 0 deletions content/en/security/cloud_siem/guide/_index.md
Original file line number Diff line number Diff line change
Expand Up @@ -14,6 +14,7 @@ disable_toc: true
{{< nextlink href="/security/cloud_siem/guide/aws-config-guide-for-cloud-siem" >}}AWS Configuration Guide for Cloud SIEM{{< /nextlink >}}
{{< nextlink href="/security/cloud_siem/guide/google-cloud-config-guide-for-cloud-siem/" >}}Google Cloud Configuration Guide for Cloud SIEM{{< /nextlink >}}
{{< nextlink href="/security/cloud_siem/guide/azure-config-guide-for-cloud-siem/" >}}Azure Configuration Guide for Cloud SIEM{{< /nextlink >}}
{{< nextlink href="/security/cloud_siem/guide/oci-config-guide-for-cloud-siem/" >}}OCI Configuration Guide for Cloud SIEM{{< /nextlink >}}
{{< nextlink href="security/cloud_siem/guide/monitor-authentication-logs-for-security-threats" >}}Monitor Authentication Logs for Security Threats{{< /nextlink >}}
{{< nextlink href="/security/cloud_siem/guide/how-to-setup-security-filters-using-cloud-siem-api" >}}Security Filters with the Cloud SIEM API{{< /nextlink >}}
{{< /whatsnext >}}
Original file line number Diff line number Diff line change
@@ -0,0 +1,50 @@
---
title: OCI Configuration Guide for Cloud SIEM
further_reading:
- link: "/security/default_rules/#cat-cloud-siem-log-detection"
tag: "Documentation"
text: "Explore Cloud SIEM default detection rules"
- link: "/security/cloud_siem/triage_and_investigate/investigate_security_signals"
tag: "Documentation"
text: "Learn about the Security Signals Explorer"
- link: "/security/cloud_siem/detect_and_monitor/custom_detection_rules/"
tag: "Documentation"
text: "Create new detection rules"
---

## Overview

Cloud SIEM applies detection rules to all processed logs in Datadog to detect threats, like a targeted attack, a threat intel listed IP communicating with your systems, or an insecure resource modification. The threats are surfaced as Security Signals in the Security Signals Explorer for triaging.

This guide walks you through the following steps to start detecting threats with your OCI Audit logs:

1. [Set up Datadog’s OCI integration](#set-up-datadogs-oci-integration)
2. [Enable log collection](#enable-log-collection)
3. [Use Cloud SIEM to triage Security Signals](#use-cloud-siem-to-triage-security-signals)

## Set up Datadog’s OCI integration

Set up Datadog’s [OCI integration](https://docs.datadoghq.com/integrations/oracle-cloud-infrastructure/?tab=createvcnrecommended) using either the QuickStart (recommended) or Terraform methods.

## Enable log collection

Ensure that log collection is enabled in the Datadog OCI integration tile:

{{< img src="security/cloud_siem/guide/oci_config_guide/oci_logs_enabled.png" alt="The OCI integration tile in Datadog with log collection enabled" style="width:90%;" >}}

## Use Cloud SIEM to triage Security Signals

Cloud SIEM applies out-of-the-box detection rules to all processed logs, including your OCI Audit logs. When a threat is detected with a detection rule, a Security Signal is generated and can be viewed in the Security Signals Explorer.

- Go to the [Cloud SIEM Signals Explorer][1] to view and triage threats. See [Investigate Security Signals][2] for further details.
- See [out-of-the-box detection rules][3] that are applied to your logs.
- Create [new rules][4] to detect threats that match your specific use case.

## Further reading

{{< partial name="whats-next/whats-next.html" >}}

[1]: https://app.datadoghq.com/security/siem/signals
[2]: /security/cloud_siem/triage_and_investigate/investigate_security_signals/
[3]: /security/default_rules/#cat-cloud-siem
[4]: /security/detection_rules/#create-detection-rules
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading