diff --git a/config/_default/menus/main.en.yaml b/config/_default/menus/main.en.yaml
index b2107587a79a6..2ed1b4168fffe 100644
--- a/config/_default/menus/main.en.yaml
+++ b/config/_default/menus/main.en.yaml
@@ -6080,6 +6080,11 @@ menu:
parent: cloud_siem
identifier: siem_guides
weight: 11
+ - name: Data Security
+ url: data_security/cloud_siem/
+ parent: cloud_siem
+ identifier: siem_data_security
+ weight: 12
- name: Cloud Security
url: security/cloud_security_management
parent: security_platform_heading
@@ -8009,51 +8014,56 @@ menu:
url: data_security/agent/
parent: data_security
weight: 1
- - name: Tracing
- identifier: data_security_tracing
- url: /tracing/configure_data_security/
+ - name: Cloud SIEM
+ identifier: data_security_cloud_siem
+ url: data_security/cloud_siem/
parent: data_security
weight: 2
- - name: Log Management
- identifier: data_security_log_management
- url: data_security/logs/
- parent: data_security
- weight: 3
- name: Kubernetes
identifier: data_security_kubernetes
url: data_security/kubernetes
parent: data_security
weight: 4
- - name: Synthetic Monitoring
- identifier: data_security_synthetic_monitoring
- url: data_security/synthetics/
+ - name: Log Management
+ identifier: data_security_log_management
+ url: data_security/logs/
parent: data_security
- weight: 5
+ weight: 4
- name: Real User Monitoring
identifier: data_security_real_user_monitoring
url: data_security/real_user_monitoring/
parent: data_security
+ weight: 5
+ - name: Synthetic Monitoring
+ identifier: data_security_synthetic_monitoring
+ url: data_security/synthetics/
+ parent: data_security
weight: 6
+ - name: Tracing
+ identifier: data_security_tracing
+ url: /tracing/configure_data_security/
+ parent: data_security
+ weight: 7
- name: PCI Compliance
identifier: data_security_pci_compliance
url: data_security/pci_compliance/
parent: data_security
- weight: 7
+ weight: 8
- name: HIPAA Compliance
identifier: data_security_hipaa_compliance
url: data_security/hipaa_compliance/
parent: data_security
- weight: 8
+ weight: 9
- name: Data Retention Periods
identifier: data_retention_periods
url: data_security/data_retention_periods/
parent: data_security
- weight: 9
+ weight: 10
- name: Guides
identifier: data_security_guide
url: data_security/guide/
parent: data_security
- weight: 9
+ weight: 11
- name: Help
url: help/
pre: info-fill
diff --git a/content/en/data_security/cloud_siem.md b/content/en/data_security/cloud_siem.md
new file mode 100644
index 0000000000000..cf739e60869e9
--- /dev/null
+++ b/content/en/data_security/cloud_siem.md
@@ -0,0 +1,62 @@
+---
+title: Cloud SIEM Data Security
+disable_toc: false
+further_reading:
+- link: "/data_security/"
+ tag: "Documentation"
+ text: "Review the main categories of data submitted to Datadog"
+- link: "/data_security/pci_compliance/"
+ tag: "Documentation"
+ text: "Set up a PCI-compliant Datadog organization"
+---
+
+
This page is about the security of data sent to Datadog. If you're looking for cloud and application security products and features, see the
Security section.
+
+## Overview
+
+Datadog generates a security signal when at least one case defined in a detection rule is matched over a given period of time. You can customize detection rules to provide notification messages that contain specific information about the signal (for example, user ID, IP addresses, and so on) and the triggering group-by values of the signal. Security rules can also use webhooks to send notifications to third-party services.
+
+Because data sent to Datadog may contain sensitive information, this document goes over those notification features and what to do if you do not want your users to have access to these features.
+
+## Security rules can use message template variables
+
+When you create a detection rule you can customize the notification message with [notification variables][1], which adds specific information related to the signal. For example, if the following JSON object is associated with a security signal:
+
+```
+{
+ "network": {
+ "client": {
+ "ip": "1.2.3.4"
+ }
+ },
+ "user": {
+ "id": "user@domain.com"
+ },
+ "used_mfa": "false"
+}
+```
+Using `{{@network.client.ip}}` in the notification message would display the IP address associated with the signal.
+
+Contact [support][2] if you want to prevent users from adding template variables to notification messages.
+
+## Security rules can include triggering group-by values in the notification title
+
+In the **Describe your playbook** sections for [log detection rules][3] and [signal correlation rules][4], you can add group-by values in the notification title. For example, if you are grouping by `service`, the service name shows in the title. Uncheck **Include triggering group-by values in notification title** to prevent group-by values from appearing in the title.
+
+Contact [support][2] if you want to remove the **Include triggering group-by values in notification title** option.
+
+## Security rules can use webhooks
+
+If your organization had HIPAA enabled in 2024 or earlier, reach out to
Datadog support to enable webhooks for security rules.
+
+Security notifications can be sent to [integrations][5], such as Jira, PagerDuty, and [webhooks][6]. Contact [support][2] to prevent users from sending notifications to third-party services using webhooks.
+
+## Further reading
+{{< partial name="whats-next/whats-next.html" >}}
+
+[1]: /security/notifications/variables/?tab=cloudsiem#template-variables
+[2]: /help/
+[3]: /security/cloud_siem/log_detection_rules/?tab=threshold#describe-your-playbook
+[4]: /security/cloud_siem/signal_correlation_rules#describe-your-playbook
+[5]: /security/notifications/#integrations
+[6]: /integrations/webhooks/
\ No newline at end of file
diff --git a/content/en/security/cloud_siem/detection_rules/_index.md b/content/en/security/cloud_siem/detection_rules/_index.md
index 3e49c5e9064b9..84487ac9917b5 100644
--- a/content/en/security/cloud_siem/detection_rules/_index.md
+++ b/content/en/security/cloud_siem/detection_rules/_index.md
@@ -386,7 +386,7 @@ One way to decrease signal noise is to prioritize production environment signals
The severity decrement is applied to signals with an environment tag starting with `staging`, `test`, or `dev`.
-## Say what's happening
+## Describe your playbook
{{% security-rule-say-whats-happening %}}
@@ -394,6 +394,8 @@ Use the **Tag resulting signals** dropdown menu to add tags to your signals. For
**Note**: the tag `security` is special. This tag is used to classify the security signal. The recommended options are: `attack`, `threat-intel`, `compliance`, `anomaly`, and `data-leak`.
+See [Cloud SIEM Data Security][7] for more information on securely using message template variables, group-by values in the notification title, and webhooks.
+
## Suppression rules
Optionally, add a suppression rule to prevent a signal from getting generated. For example, if a user `john.doe` is triggering a signal, but their actions are benign and you do not want signals triggered from this user, add the following query into the **Add a suppression query** field: `@user.username:john.doe`.
@@ -441,3 +443,4 @@ The rule deprecation process is as follows:
[4]: https://app.datadoghq.com/security/rules
[5]: /security/cloud_siem/historical_jobs/
[6]: /security/default_rules/?category=cat-cloud-siem-log-detection#all
+[7]: /data_security/cloud_siem/
diff --git a/content/en/security/cloud_siem/detection_rules/signal_correlation_rules.md b/content/en/security/cloud_siem/detection_rules/signal_correlation_rules.md
index 724924728d96a..8ff7f04ccc250 100644
--- a/content/en/security/cloud_siem/detection_rules/signal_correlation_rules.md
+++ b/content/en/security/cloud_siem/detection_rules/signal_correlation_rules.md
@@ -62,7 +62,7 @@ Click **Add Case** to add additional cases.
**Note**: The `evaluation window` must be less than or equal to the `keep alive` and `maximum signal duration`.
-### Say what's happening
+### Describe your playbook
{{% security-rule-say-whats-happening %}}
@@ -70,8 +70,11 @@ Use the **Tag resulting signals** dropdown menu to add tags to your signals. For
**Note**: the tag `security` is special. This tag is used to classify the security signal. The recommended options are: `attack`, `threat-intel`, `compliance`, `anomaly`, and `data-leak`.
+See [Cloud SIEM Data Security][2] for more information on securely using message template variables, group-by values in the notification title, and webhooks.
+
## Further reading
{{< partial name="whats-next/whats-next.html" >}}
[1]: https://app.datadoghq.com/security/configuration/rules?product=siem
+[2]: /data_security/cloud_siem/