Skip to content

Commit 39f2e3a

Browse files
AAP post-reorg updates
- removed SCA references in compat lib topics - removed Code Security reference in compat lib topics - removed old threats folder now that all files have moved Some minor content updates.
1 parent f2ccbf0 commit 39f2e3a

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

80 files changed

+261
-7610
lines changed

content/en/security/application_security/_index.md

+26-11
Original file line numberDiff line numberDiff line change
@@ -14,9 +14,6 @@ further_reading:
1414
- link: "/security/application_security/threats/"
1515
tag: "Documentation"
1616
text: "App and API Protection"
17-
- link: "/security/code_security/software_composition_analysis/"
18-
tag: "Documentation"
19-
text: "Software Composition Analysis"
2017
- link: "https://www.datadoghq.com/product/security-platform/application-security-monitoring/"
2118
tag: "Product Page"
2219
text: "Datadog App and API Protection"
@@ -45,19 +42,36 @@ algolia:
4542

4643
{{< img src="/security/application_security/app-sec-landing-page.png" alt="A security signal panel in Datadog, which displays attack flows and flame graphs" width="75%">}}
4744

48-
Datadog App and API Protection (AAP) provides protection against application-level attacks that aim to exploit code-level vulnerabilities, such as Server-Side-Request-Forgery (SSRF), SQL injection, Log4Shell, and Reflected Cross-Site-Scripting (XSS). You can monitor and protect apps hosted directly on a server, Docker, Kubernetes, Amazon ECS, and (for supported languages) AWS Fargate.
45+
**App & API Protection (AAP)** provides unified visibility and security for your applications and APIs, helping you detect, investigate, and prevent threats across modern workloads.
46+
47+
Whether you're defending public-facing APIs, internal services, or user-facing applications, AAP equips your teams with realtime OOTB threat detection, posture assessment, and in-app protections.
48+
49+
<div class="alert alert-info">Formerly known as Application Security Monitoring (ASM), AAP now goes beyond runtime threat detection to include API discovery, posture management, and protection capabilities.</div>
50+
4951

50-
AAP leverages Datadog [tracing libraries][1], and the [Datadog Agent][2] to identify services exposed to application attacks. Once configured, AAP leverages in-app detection rules to detect and protect against threats in your application environment and trigger security signals whenever an attack impacts your production system, or a vulnerability is triggered from the code.
52+
## Key capabilities
5153

52-
When a threat is detected, a security signal is generated in Datadog. For `HIGH` or `CRITICAL` severity security signals, notifications can be sent to Slack, email, or PagerDuty to notify your team and provide real-time context around threats.
54+
### API discovery and posture management
5355

54-
Once a security signal is triggered, quickly pivot to investigate and protect in Datadog. Leverage the deep observability data provided by AAP and APM distributed tracing, in one view, to resolve application issues. Analyze attack flows, view flame graphs, and review correlated trace and log data to pinpoint application vulnerabilities. Eliminate context switching by flowing through application data into remediation and mitigation steps, all within the same panel.
56+
* Automatically detect all APIs exposed by your services.
57+
* Identify unprotected, undocumented, or overly permissive endpoints.
58+
* Get detailed, contextual findings tied to specific endpoints, misconfigurations, and observed behavior.
59+
* Evaluate API configurations against posture rules based on security best practices and compliance frameworks (e.g., OWASP API Top 10).
5560

56-
With AAP, you can cut through the noise of continuous trace data to focus on securing and protecting your environment.
61+
### Runtime threat detection and protection
5762

58-
Until you fully remediate the potential vulnerabilities in your application code, AAP enables you to slow down attackers by blocking their IPs temporarily or permanently, with a single click.
63+
* Detect real-time threats such as injection attacks, account takeover attempts, and application abuse.
64+
* Correlate multi-signal attack patterns into actionable insights.
65+
* Block malicious traffic with In-App WAF rules using attributes like IP, user agent, headers, and more.
5966

60-
## Understanding how App and API Protection is implemented in Datadog
67+
## Use cases
68+
69+
* Protect customer data in production APIs
70+
* Detect and block credential stuffing and ATO attacks
71+
* Maintain API posture compliance across teams and environments
72+
* Investigate incidents with correlated trace, log, and security data
73+
74+
## AAP implementation in Datadog
6175

6276
If you're curious how App and API Protection is structured and how it uses tracing data to identify security problems, read [How App and API Protection Works][3].
6377

@@ -72,9 +86,10 @@ To start configuring your environment to detect and protect threats with AAP, fo
7286
In the [Security Signals Explorer][6], click on any security signal to see what happened and the suggested steps to mitigate the attack. In the same panel, view traces with their correlated attack flow and request information to gain further context.
7387

7488
## Disable AAP
89+
7590
For information on disabling AAP or its features, see the following:
7691

77-
- [Disabling threat management and protection][10]
92+
- [Disabling AAP][10]
7893

7994
## Next steps
8095

content/en/security/application_security/api-inventory/_index.md

+2-6
Original file line numberDiff line numberDiff line change
@@ -14,9 +14,9 @@ further_reading:
1414
- **Authentication Method**: Type of authentication used, such as Basic Auth and API key.
1515
- **Public Exposure**: Whether the API is processing traffic from the internet.
1616
- **Sensitive data flows**: Sensitive data handled by the API and flows between APIs.
17-
- **Attack Exposure**: If the endpoint is targeted by attacks (powered by [App and API Protection][2]).
17+
- **Attack Exposure**: If the endpoint is targeted by attacks.
1818
- **Business Logic**: Business logic and associated business logic suggestions for this API.
19-
- **Vulnerabilities**: If the endpoint contains a vulnerability (powered by [Code Security][8] and [Software Composition Analysis][3]).
19+
- **Vulnerabilities**: If the endpoint contains a vulnerability.
2020
- **Findings**: Security findings found on this API.
2121
- **Dependencies**: APIs and Databases the API depends on.
2222

@@ -119,10 +119,6 @@ Datadog reports the type of authentication when available in a header through th
119119
| Basic Authentication | `basic_auth` |
120120
| Digest access authentication | `digest_auth` |
121121

122-
### Vulnerabilities count
123-
124-
Counts the [Code Security][8] vulnerabilities on the endpoint , in addition to the [Software Composition Analysis][3] vulnerabilities of its service.
125-
126122
## Further reading
127123

128124
{{< partial name="whats-next/whats-next.html" >}}

content/en/security/application_security/guide/automate_risk_reduction_sca.md

-118
This file was deleted.

content/en/security/application_security/guide/standalone_application_security.md

+4-6
Original file line numberDiff line numberDiff line change
@@ -3,18 +3,18 @@ title: Set Up App and API Protection Products without using APM
33
disable_toc: false
44
---
55

6-
Datadog AAP [Threat Management][1] and [Code Security][2] are built on top of [APM][3]. While Datadog recommends using these security products with APM and adopting DevSecOps practices, you can also use these security products without using APM. This configuration is referred to as Standalone App and API Protection. This guide explains how to set up Standalone App and API Protection.
6+
Datadog AAP is built on top of [APM][3]. While Datadog recommends using AAP with APM and adopting DevSecOps practices, you can also use these security products without using APM. This configuration is referred to as Standalone App and API Protection. This guide explains how to set up Standalone App and API Protection.
77

88
## Prerequisites
99

1010
This guide assumes you have the following:
1111

1212
- **Datadog Agent:** [Install the Datadog Agent][6] and configure it for your application's operating system, container, cloud, or virtual environment.
13-
- **Supported Tracing Library:** The Datadog Tracing Library used by your application or service supports App and API Protection. For more details, see the guides for [App and API Protection][4] or [Code Security][5].
13+
- **Supported Tracing Library:** The Datadog Tracing Library used by your application or service supports App and API Protection. For more details, see the guide for [App and API Protection][4].
1414

1515
## Compatibility
1616

17-
Standalone App and API Protection is currently supported for the following tracing library versions:
17+
Standalone App and API Protection is supported for the following tracing library versions:
1818

1919
| Language | Version |
2020
| -------- | ------- |
@@ -31,12 +31,10 @@ Standalone App and API Protection is currently supported for the following traci
3131

3232
Set up the Datadog Agent using the standard method for APM or App and API Protection setup, but set up the Tracing Library by adding the `DD_APM_TRACING_ENABLED=false` environment variable to the service that runs the Tracing Library.
3333

34-
This environment variable will reduce the amount of APM data sent to Datadog to the minimum required by App and API Protection products. The environment variable can then be combined with environment variables to enable App and API Protection or Code Security.
34+
This environment variable will reduce the amount of APM data sent to Datadog to the minimum required by App and API Protection products. The environment variable can then be combined with environment variables to enable App and API Protection.
3535

3636
For App and API Protection, add the `DD_APM_TRACING_ENABLED=false DD_APPSEC_ENABLED=true` environment variable.
3737

38-
For Code Security, add the `DD_APM_TRACING_ENABLED=false DD_IAST_ENABLED=true` environment variable.
39-
4038

4139
[1]: /security/workload_protection/
4240
[2]: /security/application_security/code_security/

content/en/security/application_security/how-it-works/_index.md

+10-8
Original file line numberDiff line numberDiff line change
@@ -13,14 +13,16 @@ aliases:
1313

1414
## Overview
1515

16-
Datadog App and API Protection provides observability into application-level attacks that aim to exploit code-level vulnerabilities or abuse the business logic of your application, and into any bad actors targeting your systems. It provides:
17-
18-
- **Observability into attacks**: Provides insight into application-level attacks targeting code vulnerabilities or business logic.
19-
- **Trace-based monitoring**: Utilizes the same tracing libraries as Datadog APM to monitor traffic and detect security threats.
20-
- **Security signals**: Automatically generates security signals when attacks or business logic abuses are detected, focusing on meaningful threats rather than individual attempts.
21-
- **Notification Options**: Offers notifications through Slack, email, or PagerDuty based on security signal settings.
22-
- **Embedded security**: Integrated within the application, providing better threat identification and classification by accessing trace data.
23-
- **Enhanced WAF functionality**: Functions like a Web Application Firewall (WAF) but with additional application context, improving accuracy and reducing false positives.
16+
Datadog App and API Protection (AAP) provides observability into application and API-level attacks that aim to exploit vulnerabilities and abuse app business logic, and observability into any bad actors targeting your systems. AAP performs actions such as the following:
17+
18+
- Detects and monitors application and API-level attacks
19+
- Flags traces containing attack attempts using APM data
20+
- Highlights exposed services in security views (Software Catalog, Service Page, Traces)
21+
- Identifies bad actors by collecting client IPs and user info
22+
- Provides automatic threat pattern updates and security signals
23+
- Supports built-in protection and attack qualification
24+
- Offers visibility into API threats and attack details
25+
- Helps identify and respond to vulnerabilities like Log4Shell
2426

2527
### Identify services exposed to application attacks
2628

content/en/security/application_security/how-it-works/trace_qualification.md

-1
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,5 @@
11
---
22
title: Trace Qualification
3-
aliases:
43
further_reading:
54
- link: "/security/application_security/"
65
tag: "Documentation"

0 commit comments

Comments
 (0)