You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/en/security/detection_rules/_index.md
+28-1Lines changed: 28 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -28,6 +28,9 @@ products:
28
28
- name: App and API Protection
29
29
url: /security/application_security/
30
30
icon: app-sec
31
+
- name: Workload Protection
32
+
url: /security/workload_protection/
33
+
icon: cloud-security-management
31
34
---
32
35
33
36
{{< product-availability >}}
@@ -43,10 +46,31 @@ Out-of-the box rules are available for the following security products:
43
46
-[Cloud SIEM][3] uses log detection to analyze ingested logs in real-time.
44
47
- Cloud Security:
45
48
-[Cloud Security Misconfigurations][4] uses cloud configuration and infrastructure configuration detection rules to scan the state of your cloud environment.
46
-
-[Workload Protection][5] uses the Datadog Agent and detection rules to actively monitor and evaluate system activity.
47
49
-[Cloud Security Identity Risks][6] uses detection rules to detect IAM-based risks in your cloud infrastructure.
50
+
-[Workload Protection][5] uses the Datadog Agent and detection rules to actively monitor and evaluate system activity.
48
51
-[App and API Protection][7] (AAP) leverages Datadog [APM][8], the [Datadog Agent][9], and detection rules to detect threats in your application environment.
49
52
53
+
## MITRE ATT&CK map
54
+
55
+
{{< product-availability names="Cloud SIEM,App and API Protection,Workload Protection" >}}
56
+
57
+
MITRE ATT&CK is a framework that helps organizations understand how cyber attackers operate. It maps the following:
58
+
59
+
-**Tactics:** The "why" of an attack. These are the high-level goals, like gaining initial access, executing malicious code, or stealing data.
60
+
-**Techniques:** The "how" of an attack. These are the specific actions an attacker takes to achieve a tactic, like using phishing to get into a system or exploiting a vulnerability in software.
61
+
62
+
By mapping tactics and techniques, MITRE ATT&CK provides security teams with a common language to communicate threats and better prepare defenses.
63
+
64
+
To use the MITRE ATT&CK map, do the following:
65
+
66
+
1. Open Detection Rules in [SIEM][16] or [Workload Protection][17].
67
+
2. Select **MITRE ATT&CK map**.
68
+
3. Select one of more products in the filter <iclass="icon-filter"></i>.
69
+
4. Review the map for the following:
70
+
- Assessing Coverage: Determine which attack techniques are well-covered and which are under-monitored.
71
+
- Prioritizing Rule Creation: Focus on creating detection rules for techniques with low or no coverage.
72
+
- Streamlining Rule Management: Manage and update detection rules, ensuring they align with the latest threat intelligence.
73
+
The MITRE ATT&CK map available in SIEM or Workload Protection, but you can select Application and API Protection in the filter. Application and API Protection is included in the MITRE ATT&CK map for all-inclusive security coverage.
50
74
## Beta detection rules
51
75
52
76
Datadog's Security Research team continually adds new OOTB security detection rules. While the aim is to deliver high quality detections with the release of integrations or other new features, the performance of the detection at scale often needs to be observed before making the rule generally available. This gives Datadog's Security Research the time to either refine or deprecate detection opportunities that do not meet our standards.
@@ -175,3 +199,6 @@ The rule deprecation process is as follows:
0 commit comments