肌无力是什么病| 法务是干什么的| 前列腺钙化是什么病| 梦见买车是什么意思| 做梦拉粑粑是什么意思| 手臂痛什么原因| 48年属什么生肖| 洗劫一空是什么意思| 28.88红包代表什么意思| 六一送女孩子什么礼物| 孤独症有什么表现| 柴火饭是什么意思| 拿什么证明分居两年| 我要控制我自己是什么歌| 血常规什么颜色的管子| 扁平疣是什么样子图片| 伊玛目是什么意思| 桦树茸有什么功效| 九华山在什么地方| 233什么意思| 肚脐眼疼是什么原因| 吃火龙果有什么好处和坏处| 陈皮是什么皮做的| 乙肝恢复期是什么意思| 宝批龙什么意思| 发字五行属什么| 蛋白烫发是什么意思| 胃反酸什么原因| 走私是什么| 甲状腺病变是什么意思| 孩子黑眼圈很重是什么原因| 胆囊壁不光滑是什么意思| 木丹念什么| 乙肝表面抗原是什么意思| 茶苯海明片是什么药| 遍体鳞伤是什么意思| 花木兰姓什么| 见性成佛是什么意思| 尿结石吃什么药| 肺部挂什么科| 饱和脂肪是什么| 有一种水果叫什么竹| 能够握紧的就别放了是什么歌| 远字五行属什么| 气胸是什么意思| 撕裂性骨折是什么意思| 痤疮用什么药膏| 行代表什么生肖| 手麻去医院挂什么科| 鼻孔干燥是什么原因| 淋巴细胞浸润是什么意思| 床垫选什么材质的好| 刺史相当于现在什么官| 窦卵泡是什么意思| 老实人为什么总被欺负| ctp是什么意思| 肠胃不好吃什么水果好| 鸟语花香是什么生肖| 鼠妇是什么动物| 女人吃火龙果有什么好处| cd8高是什么原因| 肝区回声密集是什么意思| 英雄的动物是什么生肖| 什么器晚成| 翘嘴鱼吃什么食物| 过期的洗面奶可以用来做什么| 莆田系是什么意思啊| 大麦和小麦有什么区别| 廉洁奉公是什么意思| 梦见自己和别人结婚是什么意思| 凶是什么生肖| 什么芒果好吃| 河南话信球是什么意思| 抉择是什么意思| 小肝功能是检查什么| 防晒什么时候涂| pf什么意思| 过敏性鼻炎吃什么药能快速缓解| 四维空间是什么样子| 长春有什么好吃的| 什么的茄子| 圆脸适合什么眼镜| 犄角旮旯是什么意思| 通马桶的工具叫什么| 什么可以美白| 上报是什么意思| 6月6什么星座| 脚臭是什么原因引起的| 煞北是什么意思| 肌酐低是什么意思啊| 什么是音色| 什么文什么字| 人为什么要日b| 大年初一是什么生肖| 孕妇尿酸高是什么原因| 汉字最多笔画是什么字| 中蛊的人有什么症状| 吃黄精有什么好处| 脚热是什么原因引起的| 橙子什么季节成熟| 吃什么水果对心脏有好处| 什么情况下能吃脑络通| 看破红尘什么意思| 属猴的是什么命| 周杰伦的粉丝叫什么| 骨髓不造血是什么病| 农历5月25日是什么星座| 花中四君子是什么| ad是什么病的简称| 最近我和你都有一样的心情什么歌| 六味地黄丸有什么作用| 脚板肿是什么原因引起的| tomboy是什么意思| 人生苦短是什么意思| 七月份是什么季节| 血小板低什么症状| 海螺不能和什么一起吃| 势力是什么意思| 2013属什么生肖| pop是什么| 2月11号是什么星座| wi-fi是什么意思| 预防是什么意思| 兑卦代表什么| 老是胃疼是什么原因| 关节痛去医院挂什么科| 怀孕六个月出血是什么原因| 为什么支气管炎咳嗽长期不好| 七夕是什么意思| 失足妇女是什么意思| 坐骨神经痛用什么药最好| 排卵期后是什么期| 女人鼻头有痣代表什么| 心肌梗塞有什么症状| 挖苦是什么意思| 尿酸高吃什么药效果好| 胆囊壁不光滑是什么意思| ct挂号挂什么科| 什么动物怕热| e站是什么| 什么是钝角| 男人肾虚吃什么最补| 直肠给药对小孩身体有什么影响| 化验肝功挂什么科| 囹圄是什么意思| 炎性结节是什么意思| 吹胡子瞪眼是什么意思| 三句半是什么意思| 男生喜欢女生有什么表现| qs排名是什么意思| 黄帝内经是什么时期的| 带状疱疹不能吃什么东西| 属猴和什么属相相克| 酵母提取物是什么| 肾痛吃什么药| 1953属什么生肖| 为什么会尿酸高| 签注是什么| 有眼屎用什么眼药水| 腱鞘炎有什么治疗方法| 吃什么长高| asic是什么意思| 百废待兴是什么意思| 91年羊是什么命| 粥米是什么米| 什么叫银屑病| 喜爱的反义词是什么| 扁桃体切除对身体有什么影响| 土人参长什么样| 顺子是什么意思| 什么血型的人最聪明| 两个o型血能生出什么血型的孩子| 提携是什么意思| 吃什么水果可以护肝| 前列腺增生吃什么食物好| 刚生完孩子的产妇吃什么水果好| 冰岛为什么不让随便去| 所向披靡是什么意思| 东方美人茶属于什么茶| 男大女6岁有什么说法| 钢铁锅含眼泪喊修瓢锅这是什么歌| 什么时候断奶最合适| hcg是什么| 渗透压是什么意思| 可喜可贺是什么意思| 虾青素是什么| 巨蟹是什么象星座| 贼眉鼠眼是什么生肖| 咽喉炎吃什么药| 赵字五行属什么| 耳鸣挂什么科| 十月二十九是什么星座| 草长莺飞是什么生肖| 怀孕肚子痒是什么原因| 腰间盘突出什么症状| 空气棉是什么面料| 网易是什么| 荷尔蒙是什么东西起什么作用| 子宫内膜增厚是什么原因引起的| 吃槟榔有什么好处和坏处| 小山羊是什么病| 13岁属什么生肖| 6岁儿童为什么会长腿毛| 猫弓背什么意思| 山的五行属什么| 海绵体充血不足吃什么药| 咽喉炎吃什么药好得快| 肝在人体什么位置| 嘴甜是什么原因| 胸痛是什么病的前兆| 腰椎挂什么科| 夜间睡觉口干口苦是什么原因| 三sprit是什么牌子| 9岁属什么生肖| 人流是什么| 离殇是什么意思| 娃娃流鼻血是什么原因| 胎动在肚脐周围是什么胎位| 真菌感染用什么药| 胆结石挂什么科| ipa啤酒是指什么| 什么样的小手| 小儿湿疹是什么原因造成的| 乙肝小二阳是什么意思| 兔子的耳朵有什么作用| bg什么意思| 脾肾阳虚吃什么中成药最好| 肝实质回声细密是什么意思| 肛门长肉球是什么原因| 男人左手麻木什么原因| 口苦是什么原因引起的| 但爱鲈鱼美的但是什么意思| 牙龈肿痛吃什么药好得快| 声音有磁性是什么意思| 洋姜学名叫什么| 女人小腹痛什么原因| 双生痣是什么意思| 柚子是什么季节| 企鹅吃什么食物| tnt什么意思| 灰指甲什么样| 脑供血不足什么原因| 为什么会早产| 7月31日是什么星座| 颈椎轻度退行性变是什么意思| 狗刨坑是什么征兆| 胃不好看什么科| 一路繁花的意思是什么| 什么是气胸有什么症状| 总胆红素偏高是什么原因| 入定是什么意思| 脾虚吃什么食物| 维民所止什么意思| pacu是什么意思| 火靠念什么| 777是什么意思| 给猫咪取什么名字好听| 屁多屁臭是什么原因| 肝血不足吃什么食补最快| 烫伤忌口不能吃什么| 二哥是什么意思| 第一次见家长送什么礼物好| 掉头发要吃什么| 福晋是什么意思| 百度
绿色属于五行属什么 什么是功能性子宫出血 什么什么一惊 女生剪什么短发好看 肠梗阻是什么
口杯是什么意思 什么都 art什么意思 72年属鼠是什么命 教唆是什么意思
8月19号是什么星座 脾虚的人有什么症状 性取向是什么意思 梦到被蜜蜂蛰是什么意思 辽宁舰舰长是什么军衔
o.o什么意思 鲜花又什么又什么 手一直抖是什么原因 月经期体重增加是什么原因 觅是什么意思
眉心长痘是什么原因hcv8jop1ns2r.cn 手脚发热吃什么药hcv7jop6ns4r.cn 脑梗输什么液效果最好hcv8jop1ns3r.cn 什么原因引起高血压hcv8jop3ns3r.cn 今期难过美人关是什么生肖hcv9jop7ns0r.cn
春宵一刻值千金什么意思hcv9jop7ns5r.cn 一个目一个于念什么hcv8jop0ns8r.cn 子宫肌瘤伴钙化是什么意思yanzhenzixun.com 免疫性疾病是什么意思hcv7jop6ns7r.cn 石花菜是什么植物hcv8jop4ns8r.cn
川芎的功效与作用是什么hcv9jop5ns0r.cn 威士忌兑什么好喝hcv8jop7ns4r.cn 单核细胞比率偏高说明什么hcv7jop6ns1r.cn 颈椎病用什么药膏chuanglingweilai.com 澳门打车用什么软件hcv9jop3ns3r.cn
冉字五行属什么gangsutong.com 一个月来两次例假是什么原因hcv9jop3ns5r.cn 淘宝预售是什么意思qingzhougame.com 青岛是什么省hcv8jop7ns9r.cn 腰疼肚子疼是什么原因引起的hcv8jop6ns5r.cn
The Monitor

要想最终解决好朝核问题 仅仅中美双方努力还不够

百度 我们需要对我们所做的策略做到执行精准。

7 minute read

Published

Share

Discover, triage, and remediate sensitive data issues at scale with Sensitive Data Scanner
Tori Teng

Tori Teng

Aaron Kaplan

Aaron Kaplan

Managing sensitive information in your telemetry data poses many challenges to governance, risk management, and compliance (GRC) teams and overall security. Organizations in healthcare, finance, insurance, and other fields must carefully adhere to strict compliance requirements. But sensitive data comes in many forms and moves between many endpoints, and as a result, it can easily become exposed in telemetry data. What’s more, as organizations scale, troubleshooting and triaging sensitive data issues becomes an increasingly complex process, and the risks of alert fatigue, mismanagement, and oversights grow higher.

Datadog’s Sensitive Data Scanner helps you eliminate data exposure blind spots in order to ensure that you meet data compliance standards and regulations. You can use Sensitive Data Scanner to automatically identify sensitive data in your logs, APM traces, and real user monitoring (RUM) events; define high- and low-risk sensitive information using searchable tags; and redact or hash that information as needed.

In this post, we’ll show you how Sensitive Data Scanner provides fast, comprehensive visibility into potential data compliance issues through a focused central interface and context-aware classification. We’ll guide you through using Sensitive Data Scanner to:

Comprehensively manage data compliance issues

As sensitive data issues arise, GRC teams are under pressure to act fast in order to plug leaks and contain the fallout. Capturing detail along the way is also an urgent necessity, especially when it comes to providing auditors with incident reports. As these teams investigate sensitive data issues, they are confronted with a range of questions:

  • Which sensitive data has been exposed, and where has it come from?
  • Where, among many services, hosts, and environments, has the leak occurred? Which teams need to plug it, and how should they do so?
  • What caused the issue in the first place? What new security measures are called for?
  • How should this issue be prioritized alongside others?

Sensitive Data Scanner enables you to discover, triage, troubleshoot, and track data compliance issues through a central interface. The Sensitive Data Scanner summary page provides a high-level snapshot of every issue detected by your scanning rules, which define any data that might compromise the compliance, security, or privacy of your organization or users. Datadog provides a library of predefined rules that help you detect the exposure of data such as credit card numbers, email addresses, IP addresses, API keys, and more. You can also define your own regex-based scanning rules to identify business-specific sensitive information.

Datadog’s library of predefined rules for Sensitive Data Scanner.
Datadog’s library of predefined rules for Sensitive Data Scanner.

To fine-tune Sensitive Data Scanner, you can define a keyword dictionary for each of your scanning rules. Keyword dictionaries can improve the accuracy of data classification and minimize the potential for false positives. For example, defining the keywords visa, credit, and card for a Visa credit card number scanning rule will ensure that any matches are preceded by these words within a range of 30 characters.

Keyword dictionaries help you fine-tune your scanning rules.
Keyword dictionaries help you fine-tune your scanning rules.

You can also define parameters for the rule's target and actions that will be taken when a match is found, including setting a priority level.

You can set a priority level for when a rule finds a match.
You can set a priority level for when a rule finds a match.

When a scanning rule detects a match one or more times within any of the data sets you are scanning—called scanning groups—Sensitive Data Scanner designates it as an issue. It provides an overview of the sensitive data exposed in each issue and enables you to quickly create cases and Jira tickets, declare incidents, and collaborate on remediation.

Analysts can use Sensitive Data Scanner to access key information on each sensitive data issue, enabling them to start remediating without spending time gathering basic information, such as when a leak started or the number of events in which a specific set of sensitive information was exposed.

At the top of the summary page, you can find a tally of all sensitive data issues within the selected time frame. Issues are broken down by telemetry type, such as logs or traces, and priority level, which is defined as Low, Medium, High, or Critical for each issue according to your scanning rules.

The Sensitive Data Scanner summary page.
The Sensitive Data Scanner summary page.

You can also quickly review all of the scanning rules you have enabled, as well as all of the cases associated with sensitive data issues in Datadog Case Management. Case Management enables you to track, triage, and troubleshoot issues like sensitive data leaks, assign troubleshooting and remediation to users or teams, and associate cases with Jira tickets.

The Issues Overview provides a detailed snapshot of each sensitive data issue identified by your scanning rules, sorted by priority level.

The Issues Overview provides a detailed snapshot of each sensitive data issue identified by your scanning rules, sorted by priority level.
The Issues Overview provides a detailed snapshot of each sensitive data issue identified by your scanning rules, sorted by priority level.

The overview includes the following key information on each issue:

  • The specific scanning rule that has detected matches, so that you can easily determine which rules to modify as needed
  • The scanning groups—user-defined groups that specify relevant services, hosts, environments, or other classifying data—in which the issue has occurred, so that you can easily determine the blast radius of any leaks
  • The number of events associated with the issue, helping you quickly gauge its scope and severity
  • A trendline of these events and an index of when the most recent one occurred, allowing you to pinpoint when an issue started and get a quick picture of its development

You can select any issue from the summary page to open an expanded view. Here, you can find a timeseries graph of the leak, as well as a list of the sensitive-data events from Datadog Log Management, APM, RUM, and Event Management, which you can spot-check to quickly pinpoint where and how the sensitive information is being exposed.

From the summary page, you can access a side panel for each issue from which you can jumpstart your investigation and response.
From the summary page, you can access a side panel for each issue from which you can jumpstart your investigation and response.

Below that, you can assess the blast radius of each issue with the help of a breakdown of the services, hosts, and environments in which the data was exposed, as well as a list of the users who may have accessed it (via an integration with Audit Trail). Sensitive Data Scanner’s close integration with Datadog Service Catalog also helps you quickly determine which teams own any services involved in a leak, so you can resolve issues faster.

Quickly assess the blast radius of each issue and determine who to contact to plug leaks.
Quickly assess the blast radius of each issue and determine who to contact to plug leaks.

You can also pivot from the expanded view to Datadog Log Management, APM, RUM, or Event Management for a more detailed analysis of specific events, so that you can better identify patterns. Or you can pivot to Audit Trail to see related events involving Sensitive Data Scanner configuration changes or user queries with sensitive data tags.

Overall, these expanded views serve as strong starting points for troubleshooting data compliance issues and investigating potential leaks. And by identifying all affected services, environments, and hosts—as well as the teams responsible for them—in each expanded view, the Sensitive Data Scanner summary page enables you to quickly delegate and track remediation.

Kickstart investigations into potential data leaks

With its close integrations with Case Management and Incident Management, Sensitive Data Scanner helps you quickly start a coordinated response to any sensitive data issue. You can easily create cases or incidents directly from the summary page, create Jira tickets linked to issues in Case Management, delegate responders, and automatically point those responders to the relevant data.

Sensitive Data Scanner is closely integrated with Case Management, so you can easily manage a coordinated response to all of your sensitive data issues.
Sensitive Data Scanner is closely integrated with Case Management, so you can easily manage a coordinated response to all of your sensitive data issues.

Case Management enables you to create a record of each issue, its causes, and the remediation actions that have been taken to resolve it. Along with Audit Trail’s ability to capture audit events of user queries of sensitive data, this can be particularly vital as analysts work with auditors and write postmortems.

Let’s say you’re a security analyst and the Sensitive Data Scanner detects JSON web tokens (JWTs) in your organization’s logs, APM traces, or RUM events. Since you have configured alerting based on the tags associated with your Sensitive Data Scanner rules, you immediately receive an alert from Datadog. From there, you can navigate to the Sensitive Data Scanner summary page to quickly gauge the blast radius of the leak and determine the owners of the affected services. Based on your findings, you can create a new case for each affected service—or, if the issue seems like it might have a significant impact on your end users, declare an incident—and delegate remediation tasks as needed.

Scale your data compliance posture

The Sensitive Data Scanner summary page enables you to effectively manage data compliance issues at scale. You can use it to discover and manage sensitive data issues in your logs, APM traces, and RUM events, conduct triage and troubleshooting, and assign and track remediation tasks.

Datadog users can start managing sensitive data issues via the Sensitive Data Scanner summary page today. To learn more about Sensitive Data Scanner, you can find more information on our blog or check out our documentation. If you’re new to Datadog, you can sign up for a 14-day .

Related Articles

Cloud SIEM and Flex Logs: Enhanced security insights for the cloud

Cloud SIEM and Flex Logs: Enhanced security insights for the cloud

Manage costs for your AWS logs using Datadog Observability Pipelines

Manage costs for your AWS logs using Datadog Observability Pipelines

Add more context to Cloud SIEM detections and investigations with Datadog Reference Tables

Add more context to Cloud SIEM detections and investigations with Datadog Reference Tables

Unify security operations with standardized logging using Datadog Observability Pipelines and Amazon Security Lake

Unify security operations with standardized logging using Datadog Observability Pipelines and Amazon Security Lake

Start monitoring your metrics in minutes

百度