文采是什么意思| 早泄要吃什么药| 团是什么结构| 东方是什么意思| 神态是什么意思| 腹部疼痛挂什么科| castle是什么意思| 四战之地的生肖是什么| 桃子不能跟什么一起吃| 两女 一杯是什么| 毒灵芝长什么样| 酸菜鱼可以放什么配菜| ns是什么| 后脑勺痛什么原因引起的| 津液亏虚是什么意思| 腿水肿是什么原因| 三个马读什么| 鸟屎掉头上有什么预兆| 心动过缓是什么意思| 做梦捡到钱是什么意思| 市委讲师团是什么级别| 蠓虫叮咬后涂什么药膏| 愚公移山是什么故事| 色字头上一把刀什么意思| 麦冬的功效与作用是什么| 10月20日什么星座| 增殖灶是什么意思| 吃蒜有什么好处| 医院打耳洞挂什么科| 懦弱的反义词是什么| 4点是什么时辰| 奶白色是什么颜色| 香蕉是什么季节的| 舌头有麻木感什么原因| 嘴唇干裂是什么原因| 肺癌不能吃什么水果| 拔牙后吃什么药| 耸肩是什么意思| 吃什么长头发| 猫不能吃什么| 鲍温病是什么病| 隐身是什么意思| 番茄红素有什么作用| 吐痰带血是什么原因| 96166是什么电话| 三伏天要注意什么| 灌肠为什么能通输卵管| 姨妈是什么| 三叉戟是什么车| 常喝蜂蜜水有什么好处和坏处| 77属什么生肖| 成吉思汗属什么生肖| 卤水是什么| 吃不胖是什么原因| 五行缺木是什么命| 10月15号是什么星座的| 为什么一来月经就拉肚子| 肝功能不全是什么意思| 母带是什么意思| 什么东西蛋白质最高| 蚱蜢吃什么食物| 淘宝和天猫有什么区别| 李子什么时候成熟| 地牛是什么| 莎字五行属什么| 尿的酸碱度能说明什么| 天葬是什么| 瘢痕是什么意思| 容易长口腔溃疡是什么原因| 小便多是什么原因| 上火咳嗽吃什么药| 非转基因是什么意思| 十月七号什么星座| 水洗真丝是什么面料| 窦性心律t波改变是什么意思| 什么的鼓励| 谦虚的什么| 猫不喜欢什么味道| 左肩膀疼是什么原因| 可望不可求是什么意思| 验血能查出什么| 泡沫尿吃什么药| 数字2代表什么意思| b1是什么意思| 什么像什么又像什么| 体脂是什么意思| 月亮为什么会变成红色| 葡萄像什么比喻句| 产品批号什么意思| 睡觉流口水是什么原因引起的| 97年的牛是什么命| 梦见掰玉米是什么意思| 脂肪是什么意思| 午字五行属什么| 诸葛亮姓什么| 官杀混杂是什么意思| 综合是什么意思| 市政府办公室主任是什么级别| 学护理需要什么条件| 惜字如金是什么意思| 神经衰弱吃什么药最好| 吾矛之利的利什么意思| 青鱼吃什么| 大姨妈期间不能吃什么东西| 貂蝉姓什么| 女人有卧蚕代表什么| 荨麻疹打什么针| 腋窝疼痛挂什么科| o发什么音| 气血不足吃什么中成药| 皮下出血是什么原因| 泰迪狗长什么样子| com代表什么意思| 高血糖可以吃什么| 什么牌子的空调好用又省电| 蛤蟆吃什么| 牛肉炖什么菜好吃| 什么品牌的床好| 巴黎世家是什么| 做梦牙掉了是什么征兆| 处方药是什么标志| 话少一般都是什么人| 角是什么意思| 阴虚吃什么中药| 高血压喝什么茶好| 白猫是什么品种| 吃开心果有什么好处和坏处| 视频是什么意思| 左肾积水是什么意思| 皮赘是什么原因引起的| 蛀牙是什么原因引起的| 腋毛癣用什么药膏| 喝酒后腰疼是什么原因| 待我长发及腰时下一句是什么| 13年是什么年| 8月7日什么星座| 呼呼是什么意思| 什么饼干养胃最好| 梦到吃螃蟹是什么意思| dha什么时候吃最好| 什么叫疱疹| 迷糊是什么原因| 安宫牛黄丸治什么病| 常喝苦荞茶有什么好处| 秀才相当于现在的什么学历| 钾是什么东西| 泛滥成灾是什么意思| 肌肉损伤吃什么药| 不等闲是什么意思| 干咳 吃什么药| 尿盐结晶是什么意思| 芝士可以做什么美食| 健康查体是什么意思| 通便吃什么药最快| 盗汗什么意思| 穷极一生是什么意思| 入驻是什么意思| 中期唐氏筛查查什么| 考科二紧张心慌有什么方法缓解| 症是什么意思| 宝宝腹泻吃什么药| 因小失大是什么生肖| 中国第一长洞是什么| 囟门是什么意思| 血糖高喝什么酒好| 胃食管反流什么症状| 灵芝长什么样| 眉尾长痘是什么原因| 贴水是什么意思| 分心念什么| 用牙膏洗脸有什么好处和坏处| 碟鱼头是什么鱼| 尿失禁用什么药好| 男生学什么技术吃香| 9.27日是什么星座| 信手拈来是什么意思| 什么叫声母什么叫韵母| 椎间盘突出挂什么科| pos是什么意思| 子五行属什么| 新生儿晚上哭闹不睡觉是什么原因| 为什么一喝牛奶就拉肚子| 体重除以身高的平方是什么指数| 摸不到心跳是什么情况| 艾蒿是什么| 头发麻是什么病的前兆| 马克定食是什么意思| 印度为什么没把墨脱占领| 心经讲的是什么| 狂躁症是什么| 血糖高吃什么药最好| 陈醋和蜂蜜一起喝有什么好处| 925银和s925银有什么区别| 红豆吃多了有什么坏处| 手脚浮肿是什么原因引起的| 14k金是什么意思| 基因是什么| 丈二和尚摸不着头脑是什么意思| 全科医生是什么意思| 早搏是什么感觉| 湿热是什么症状| 买什么样的老花镜好| 奎宁现在叫什么药| 艾滋病中期有什么症状| 脑残是什么意思| 小麦肤色是什么颜色| 7月7日是什么星座| 非甾体是什么意思| 手术后吃什么营养品好| 卡西欧手表什么档次| 璀璨人生是什么意思| 广州地铁什么时候停运| 懿是什么意思| 军师是什么意思| 抖机灵是什么意思| 香瓜不能和什么一起吃| 伤寒现在叫什么病| 一直不来月经是什么原因| 摩羯是什么| 梦见剪指甲是什么意思| 鹿茸和什么泡酒壮阳| 人夫是什么意思| 瑜伽是什么| 什么是公元前和公元后| 梦见自己拉屎是什么意思| 勾践姓什么| 单侧耳鸣是什么原因引起的| 编程属于什么专业| 术是什么意思| 不孕为什么要查胰岛素| 晕车是什么原因| 普拉提和瑜伽有什么区别| 什么样的伤口算开放性| 屠苏酒是什么酒| 什么是横纹肌溶解症| 牙疼吃什么止疼药见效快| 不知道为什么| 内风湿是什么原因引起的| 什么是69| 头发里长痣代表什么| 补刀什么意思| 龟头流脓小便刺痛吃什么药| 旮旯是什么意思| 什么时候恢复的高考| 八月三十日是什么星座| 为什么小腿肌肉酸痛| 舌苔很厚很白什么原因| 例假血发黑是什么原因| 强直性脊柱炎吃什么药| 最近发胖过快什么原因| 棒打鸳鸯什么意思| 切除扁桃体有什么好处和坏处| 扫把和什么是一套的| 肾亏是什么原因造成的| 低血压是什么原因造成的| 宫颈肥大需要注意什么| 霉菌阴道炎是什么引起的| 脚气有什么症状| 小翅膀车标是什么车| 吃东西没有味道是什么原因| 周传雄得了什么病| 教唆什么意思| 肠化十是什么意思| 汉武帝是什么朝代| 百度
猛吸气胸口疼什么原因 血糖高吃什么药最好 心脏早搏什么症状 专辑是什么 梦见白发是什么意思
淡盐水有什么作用和功效 资产负债率高说明什么 里番是什么 日本兵为什么不怕死 壬申日是什么意思
mg什么意思 手掌痒是什么原因 灵芝有什么好处 1997年什么命 猪肝跟什么相克
slf是什么意思 补钙什么时间段最好 办什么厂比较好 葡萄糖是什么意思 左眉上方有痣代表什么
乳头瘤病毒是什么病hcv9jop2ns6r.cn 红班狠疮的早期症状是什么hcv8jop1ns2r.cn 嗜酸性粒细胞是什么hcv7jop5ns0r.cn 什么是再生纤维面料hcv8jop3ns1r.cn amor是什么意思hcv9jop1ns6r.cn
4.12是什么星座hcv8jop9ns3r.cn 看输卵管是否堵塞做什么检查hcv9jop0ns3r.cn 甲肝抗体阳性代表什么hcv7jop7ns0r.cn 属虎和什么属相最配travellingsim.com 香蕉可以做什么美食mmeoe.com
lt是什么意思hcv9jop2ns3r.cn 什么是白脉病zhiyanzhang.com 为什么要小心吉普赛人tiangongnft.com 老虎下山下一句是什么cl108k.com 妒忌什么意思hcv8jop2ns3r.cn
松鼠咬人后为什么会死hcv7jop7ns0r.cn 无下限是什么意思gangsutong.com 什么是普拉提hcv9jop4ns3r.cn 张少华什么时候去世的hcv9jop5ns6r.cn 表姐的儿子叫什么hcv9jop7ns0r.cn
百度   30至40岁的最易离婚  撇开楼市因素,目前导致申城市民离婚的两大诱因还是感情不和、感情破裂。

6 minute read

Published

Share

Automate common security tasks and stay ahead of threats with Datadog Workflows and Cloud SIEM
Nicholas Thomson

Nicholas Thomson

Andy Giron

Andy Giron

Arjun Katragadda

Arjun Katragadda

Partha Naidu

Partha Naidu

Detecting and remediating security threats is a constantly evolving concern for modern DevSecOps and security operations center (SOC) teams. Moreover, manually investigating and responding to vulnerabilities and threats is time-consuming, laborious, and knowledge-intensive. Datadog Workflows, which is now available in the Service Management and Integrations menus, can be used in concert with Cloud SIEM to automate repetitive security tasks—such as triaging security signals or detecting emerging vulnerabilities.

Using Datadog Cloud SIEM and Workflows together reduces the burden on security engineers, allowing them to focus on more complex tasks, and helps teams stay ahead of novel threats by automating the classification of emerging vulnerabilities. Cloud SIEM and Workflows also integrate with Datadog Case Management—which allows you to create a centralized, easily accessible workspace for investigating your security signals—so that you can streamline triage and troubleshooting. These integrations help teams reduce tool sprawl and security spend. Rather than maintaining separate automation, case management, and SIEM tools, you can unify these capabilities in a single pane of glass. Additionally, workflow blueprints that can be used in conjunction with Cloud SIEM detection rules are formulated in consultation with Datadog’s dedicated security research team and detection engineers, whose insights can help you prepare for unforeseen threats.

In this post, we'll show you how to:

Automate security signal triage with Workflows and Case Management

A Datadog workflow orchestrates an automated series of actions in response to an alert or security signal. You can chain together Datadog-specific actions in a workflow, or actions from integrations such as AWS, CircleCI, Okta, PagerDuty, and more. You can configure your workflows to automate important security tasks, such as rolling back a code deployment that introduces a vulnerability, performing tier 1 triage (i.e., reviewing and adding context to threats detected by Cloud SIEM), or blocking a suspicious IP address.

As an example, the workflow below automates the data collection step of using Datadog Case Management to triage a security signal.

This workflwo automates the data collection step of triaging a security signal
This workflwo automates the data collection step of triaging a security signal

Security signals provide a lot of information, but not necessarily enough to determine whether an alert warrants further investigation or is a false positive. This workflow, when applied to a detection rule of your choosing, will trigger a series of subsequent actions every time the rule is triggered and a new signal is generated. This starts with creating a new case in Case Management, which provides a centralized ticketing system for all issues in your application, enabling your team to track, automate the triage process, and assign issues proactively. By enriching cases with relevant context from your observability data, you can investigate more efficiently, identify and eliminate false positives, and declare an incident if you determine that a security signal is in fact a malicious event.

Next, the workflow will trigger a search in Datadog for activity related to the user identified in the signal. This can provide additional context on why the signal was triggered and surface other areas of your environment that may have been compromised. Then, the workflow will update Datadog Notebooks within the case with the relevant data about this signal—such as logs, key metrics on the volume and on the timing of suspicious requests, and IP addresses of potential attackers. This will help you kick-start your investigation and set your response and remediation process in motion as quickly as possible.

Identify, retro-hunt, and create detection rules for emerging vulnerabilities using a workflow

Workflow blueprints are out-of-the-box sequences of actions provided by Datadog. The blueprints are organized by use case, and there are a number covering essential security processes. These include notifying your team on Slack if S3 buckets are not encrypted, disabling or deleting an AWS IAM user, blocking an IP with Cloudflare, and other security actions.

A helpful workflow used internally by our security research team is the Detect Emerging Vulnerabilities workflow, which searches the internet for references to a specific vulnerability and determines whether the vulnerability is emerging.

This workflow begins with the user setting an input parameter, which would be a common vulnerability and exposure (CVE) number or the name of vulnerability (such as "Dirty Pipe"). If the input is a CVE number, the workflow will query the National Vulnerability Database for metadata related to the vulnerability. The workflow then proceeds to search for open source intelligence on Twitter, GitHub, and the Infosec Exchange Mastodon community to gauge the number of instances of or references to the vulnerability in the wild, identify potential proof-of-concept exploits, and check the vulnerability's zero-day status. Based on the results of these queries, the workflow yields a score to determine the severity of the vulnerability.

If, based on this score, the vulnerability is determined to be a critical threat, the the Detect Emerging Vulnerabilities workflow will automatically send a Slack message to the relevant parties and provide detailed information on the vulnerability, remediation steps, and the option to create an incident with the click of a button.

If the workflow discovers indicators of compromise (IoCs) on Twitter or Infosec Exchange that are associated with an emerging vulnerability, the workflow will initiate a 30-day retro-hunt query on your logs, searching for evidence of these IoCs in your environment. The workflow will then alert the analyst if this search discovers signs of compromise in your logs and update the Notebooks with the relevant data about this retro-hunt—enabling your team to further investigate these events.

Finally, the workflow will trigger the creation of a detection rule in Cloud SIEM that will generate a security signal for this vulnerability based on the specific IoCs that were discovered. Going forward, this enables you to detect if an attacker is attempting to exploit the vulnerability in your environment.

Automate common security tasks with Workflows and Cloud SIEM

Datadog Cloud SIEM’s new integration with Workflows helps you automate the triage and analysis of security data, expedite issue resolution, and ease coordination across teams by consolidating incident response processes in a single pane of glass. By automating common security tasks, your team can focus on the most critical security issues and leverage Datadog's wealth of security research experience to detect and defend against unforeseen threats.

Workflows and Case Management can be accessed from the Service Management menu and directly from Cloud SIEM’s Signal side panel. Users who also have Cloud SIEM can start adding workflows to their security and threat detection processes. If you’re new to Datadog, sign up for 14-day .

Related Articles

Migrate from your existing SIEM and quickly onboard security teams with Datadog Cloud SIEM

Migrate from your existing SIEM and quickly onboard security teams with Datadog Cloud SIEM

Normalize your data with the OCSF Common Data Model in Datadog Cloud SIEM

Normalize your data with the OCSF Common Data Model in Datadog Cloud SIEM

Build, test, and scale detections as code with Datadog Cloud SIEM

Build, test, and scale detections as code with Datadog Cloud SIEM

Automate Cloud SIEM investigations with Bits AI Security Analyst

Automate Cloud SIEM investigations with Bits AI Security Analyst

Start monitoring your metrics in minutes

百度