You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
- removed SCA references in compat lib topics
- removed Code Security reference in compat lib topics
- removed old threats folder now that all files have moved
Some minor content updates.
{{< img src="/security/application_security/app-sec-landing-page.png" alt="A security signal panel in Datadog, which displays attack flows and flame graphs" width="75%">}}
47
44
48
-
Datadog App and API Protection (AAP) provides protection against application-level attacks that aim to exploit code-level vulnerabilities, such as Server-Side-Request-Forgery (SSRF), SQL injection, Log4Shell, and Reflected Cross-Site-Scripting (XSS). You can monitor and protect apps hosted directly on a server, Docker, Kubernetes, Amazon ECS, and (for supported languages) AWS Fargate.
45
+
**App & API Protection (AAP)** provides unified visibility and security for your applications and APIs, helping you detect, investigate, and prevent threats across modern workloads.
46
+
47
+
Whether you're defending public-facing APIs, internal services, or user-facing applications, AAP equips your teams with realtime OOTB threat detection, posture assessment, and in-app protections.
48
+
49
+
<divclass="alert alert-info">Formerly known as Application Security Monitoring (ASM), AAP now goes beyond runtime threat detection to include API discovery, posture management, and protection capabilities.</div>
50
+
49
51
50
-
AAP leverages Datadog [tracing libraries][1], and the [Datadog Agent][2] to identify services exposed to application attacks. Once configured, AAP leverages in-app detection rules to detect and protect against threats in your application environment and trigger security signals whenever an attack impacts your production system, or a vulnerability is triggered from the code.
52
+
## Key capabilities
51
53
52
-
When a threat is detected, a security signal is generated in Datadog. For `HIGH` or `CRITICAL` severity security signals, notifications can be sent to Slack, email, or PagerDuty to notify your team and provide real-time context around threats.
54
+
### API discovery and posture management
53
55
54
-
Once a security signal is triggered, quickly pivot to investigate and protect in Datadog. Leverage the deep observability data provided by AAP and APM distributed tracing, in one view, to resolve application issues. Analyze attack flows, view flame graphs, and review correlated trace and log data to pinpoint application vulnerabilities. Eliminate context switching by flowing through application data into remediation and mitigation steps, all within the same panel.
56
+
* Automatically detect all APIs exposed by your services.
57
+
* Identify unprotected, undocumented, or overly permissive endpoints.
58
+
* Get detailed, contextual findings tied to specific endpoints, misconfigurations, and observed behavior.
59
+
* Evaluate API configurations against posture rules based on security best practices and compliance frameworks (e.g., OWASP API Top 10).
55
60
56
-
With AAP, you can cut through the noise of continuous trace data to focus on securing and protecting your environment.
61
+
### Runtime threat detection and protection
57
62
58
-
Until you fully remediate the potential vulnerabilities in your application code, AAP enables you to slow down attackers by blocking their IPs temporarily or permanently, with a single click.
63
+
* Detect real-time threats such as injection attacks, account takeover attempts, and application abuse.
64
+
* Correlate multi-signal attack patterns into actionable insights.
65
+
* Block malicious traffic with In-App WAF rules using attributes like IP, user agent, headers, and more.
59
66
60
-
## Understanding how App and API Protection is implemented in Datadog
67
+
## Use cases
68
+
69
+
* Protect customer data in production APIs
70
+
* Detect and block credential stuffing and ATO attacks
71
+
* Maintain API posture compliance across teams and environments
72
+
* Investigate incidents with correlated trace, log, and security data
73
+
74
+
## AAP implementation in Datadog
61
75
62
76
If you're curious how App and API Protection is structured and how it uses tracing data to identify security problems, read [How App and API Protection Works][3].
63
77
@@ -72,9 +86,10 @@ To start configuring your environment to detect and protect threats with AAP, fo
72
86
In the [Security Signals Explorer][6], click on any security signal to see what happened and the suggested steps to mitigate the attack. In the same panel, view traces with their correlated attack flow and request information to gain further context.
73
87
74
88
## Disable AAP
89
+
75
90
For information on disabling AAP or its features, see the following:
Copy file name to clipboardExpand all lines: content/en/security/application_security/guide/standalone_application_security.md
+4-6
Original file line number
Diff line number
Diff line change
@@ -3,18 +3,18 @@ title: Set Up App and API Protection Products without using APM
3
3
disable_toc: false
4
4
---
5
5
6
-
Datadog AAP [Threat Management][1] and [Code Security][2] are built on top of [APM][3]. While Datadog recommends using these security products with APM and adopting DevSecOps practices, you can also use these security products without using APM. This configuration is referred to as Standalone App and API Protection. This guide explains how to set up Standalone App and API Protection.
6
+
Datadog AAP is built on top of [APM][3]. While Datadog recommends using AAP with APM and adopting DevSecOps practices, you can also use these security products without using APM. This configuration is referred to as Standalone App and API Protection. This guide explains how to set up Standalone App and API Protection.
7
7
8
8
## Prerequisites
9
9
10
10
This guide assumes you have the following:
11
11
12
12
-**Datadog Agent:**[Install the Datadog Agent][6] and configure it for your application's operating system, container, cloud, or virtual environment.
13
-
-**Supported Tracing Library:** The Datadog Tracing Library used by your application or service supports App and API Protection. For more details, see the guides for [App and API Protection][4] or [Code Security][5].
13
+
-**Supported Tracing Library:** The Datadog Tracing Library used by your application or service supports App and API Protection. For more details, see the guide for [App and API Protection][4].
14
14
15
15
## Compatibility
16
16
17
-
Standalone App and API Protection is currently supported for the following tracing library versions:
17
+
Standalone App and API Protection is supported for the following tracing library versions:
18
18
19
19
| Language | Version |
20
20
| -------- | ------- |
@@ -31,12 +31,10 @@ Standalone App and API Protection is currently supported for the following traci
31
31
32
32
Set up the Datadog Agent using the standard method for APM or App and API Protection setup, but set up the Tracing Library by adding the `DD_APM_TRACING_ENABLED=false` environment variable to the service that runs the Tracing Library.
33
33
34
-
This environment variable will reduce the amount of APM data sent to Datadog to the minimum required by App and API Protection products. The environment variable can then be combined with environment variables to enable App and API Protection or Code Security.
34
+
This environment variable will reduce the amount of APM data sent to Datadog to the minimum required by App and API Protection products. The environment variable can then be combined with environment variables to enable App and API Protection.
35
35
36
36
For App and API Protection, add the `DD_APM_TRACING_ENABLED=false DD_APPSEC_ENABLED=true` environment variable.
37
37
38
-
For Code Security, add the `DD_APM_TRACING_ENABLED=false DD_IAST_ENABLED=true` environment variable.
Copy file name to clipboardExpand all lines: content/en/security/application_security/how-it-works/_index.md
+10-8
Original file line number
Diff line number
Diff line change
@@ -13,14 +13,16 @@ aliases:
13
13
14
14
## Overview
15
15
16
-
Datadog App and API Protection provides observability into application-level attacks that aim to exploit code-level vulnerabilities or abuse the business logic of your application, and into any bad actors targeting your systems. It provides:
17
-
18
-
-**Observability into attacks**: Provides insight into application-level attacks targeting code vulnerabilities or business logic.
19
-
-**Trace-based monitoring**: Utilizes the same tracing libraries as Datadog APM to monitor traffic and detect security threats.
20
-
-**Security signals**: Automatically generates security signals when attacks or business logic abuses are detected, focusing on meaningful threats rather than individual attempts.
21
-
-**Notification Options**: Offers notifications through Slack, email, or PagerDuty based on security signal settings.
22
-
-**Embedded security**: Integrated within the application, providing better threat identification and classification by accessing trace data.
23
-
-**Enhanced WAF functionality**: Functions like a Web Application Firewall (WAF) but with additional application context, improving accuracy and reducing false positives.
16
+
Datadog App and API Protection (AAP) provides observability into application and API-level attacks that aim to exploit vulnerabilities and abuse app business logic, and observability into any bad actors targeting your systems. AAP performs actions such as the following:
17
+
18
+
- Detects and monitors application and API-level attacks
19
+
- Flags traces containing attack attempts using APM data
20
+
- Highlights exposed services in security views (Software Catalog, Service Page, Traces)
21
+
- Identifies bad actors by collecting client IPs and user info
22
+
- Provides automatic threat pattern updates and security signals
23
+
- Supports built-in protection and attack qualification
24
+
- Offers visibility into API threats and attack details
25
+
- Helps identify and respond to vulnerabilities like Log4Shell
24
26
25
27
### Identify services exposed to application attacks
0 commit comments