Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[DOCS-6373] ASM Security signals doc #20832

Closed
Closed
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
9 changes: 7 additions & 2 deletions config/_default/menus/menus.en.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -3512,16 +3512,21 @@ main:
parent: appsec_threats
identifier: threats_event_rules
weight: 506
- name: Security Signals
url: security/application_security/threats/security_signals/
parent: appsec_threats
identifier: threats_security_signals
weight: 507
- name: Trace Qualification
url: security/application_security/threats/trace_qualification/
parent: appsec_threats
identifier: threats_trace_qualification
weight: 507
weight: 508
- name: Threat Intelligence
url: security/application_security/threats/threat-intelligence/
parent: appsec_threats
identifier: threats_threat_intelligence
weight: 508
weight: 509
- name: Guides
url: security/application_security/guide/
parent: application_security
Expand Down
Original file line number Diff line number Diff line change
@@ -0,0 +1,95 @@
---
title: Investigate Security Signals
kind: documentation
further_reading:
- link: "/security/default_rules/?category=cat-csm-threats#all"
tag: "Documentation"
text: "Explore CSM Threats detection rules"
- link: "/security/threats/workload_security_rules"
tag: "Documentation"
text: "Learn how to manage CSM Threats detection rules"
- link: "/security/notifications/"
tag: "Documentation"
text: "Learn more about security notifications"
---

## Overview

When threat data for your services is coming into Datadog, [Application Security Management (ASM) Overview][7] shows a summary of what's happening. Here, you can enable vulnerability detection, review attacks, customize alerting and reporting, and enable ASM on your services. To investigate signals of suspicious activity, click a service's **Review** link.

{{< img src="security/application_security/threats/security_signals/appsec-overview.png" alt="ASM overview page showing services secured by ASM">}}

## How it works

ASM security signals are created when Datadog detects a threat based on a security rule. View, search, filter, and investigate security signals in the [Signals Explorer][2], or configure [Notification Rules][8] to send signals to third-party tools.

In the [Signals Explorer][2], filter by attributes and facets to find critical threats. Click into a signal to see details for it, including the user information and their IP address, what rule they triggered, attack flow, and related traces and other security signals. From this page you can also click to create a case and declare an incident.

Check notice on line 26 in content/en/security/application_security/threats/security_signals.md

View workflow job for this annotation

GitHub Actions / vale

[vale] content/en/security/application_security/threats/security_signals.md#L26

[Datadog.sentencelength] Try to keep your sentence length to 25 words or fewer.
Raw output
{"message": "[Datadog.sentencelength] Try to keep your sentence length to 25 words or fewer.", "location": {"path": "content/en/security/application_security/threats/security_signals.md", "range": {"start": {"line": 26, "column": 89}}}, "severity": "INFO"}

{{< img src="security/application_security/threats/security_signals/appsec-threat-signals-details.png" alt="Overview of investigating threats in signals explorer with details side panel">}}

## Filter security signals

To filter the security signals in the [Signals Explorer][2], use the search query `@workflow.triage.state:<status>`, where `<status>` is the state you want to filter on (`open`, `under_review`, or `archived`). You can also use the **Signal State** facet on the facet panel.

## Triage a signal

You can triage a signal by assigning it to a user for further investigation. The assigned user can then track their review by updating the signal's status.

1. On the [Signals Explorer][2], select a security signal.
2. On the signal side panel, click the user profile icon and select a user.
3. To update the status of the security signal, click the triage status dropdown menu and select a status. The default status is **Open**.
- **Open**: The signal has not yet been resolved.
- **Under Review**: The signal is actively being investigated. From the **Under Review** state, you can move the signal to **Archived** or **Open** as needed.
- **Archived**: The detection that caused the signal has been resolved. From the **Archived** state, you can move the signal back to **Open** if it's within 30 days of when the signal was originally detected.

**Note**: To modify security signals, you must have the `security_monitoring_signals_write` permission. See [Role Based Access Control][9] for more information about Datadog's default roles and granular role-based access control permissions available for Application Security Management.

## Create a case

Use [Case Management][6] to track, triage, and investigate security signals.

1. On the [Signals Explorer][2], select a security signal.
2. On the signal side panel select the **Create a case** dropdown. Select **Create a new case**, or **Add to an existing case** to add the signal to an existing case.

Check warning on line 52 in content/en/security/application_security/threats/security_signals.md

View workflow job for this annotation

GitHub Actions / vale

[vale] content/en/security/application_security/threats/security_signals.md#L52

[Datadog.words] Use 'Create a' or 'Create an' instead of 'Create a new'.
Raw output
{"message": "[Datadog.words] Use 'Create a' or 'Create an' instead of 'Create a new'.", "location": {"path": "content/en/security/application_security/threats/security_signals.md", "range": {"start": {"line": 52, "column": 77}}}, "severity": "WARNING"}
3. Enter a title and optional description.
4. Click **Create Case**.

## Declare an incident

Use [Incident Management][4] to create an incident for a security signal.

1. On the [Signals Explorer][2], select a security signal.
2. On the signal side panel, click the **Declare Indident** dropdown menu and select **Create an incident**, or **Add to an existing incident**.
3. On the incident creation modal, configure the incident by specifying details such as the severity level and incident commander.
4. Click **Declare Incident**.

## Run a workflow

Use [Workflow Automation][5] to manually trigger a workflow for a security signal.

1. On the [Signals Explorer][4], select a security signal.
2. Scroll down to the **What is Workflow Automation** section.
3. Click **Run Workflow**.
4. On the workflow modal, select the workflow you want to run. Depending on the workflow, you may be required to enter additional input parameters.
5. Click **Run**.

## Review and remediate

1. On the [Signals Explorer][2], select a security signal.
2. On the signal side panel, click each of the review tabs such as **Attack Flow**, **Activity Summary**, and **Rule Details**.
3. Review the **Suggested Next Steps**, and take action:
- Click to **Block attacking users and IPs**
- Click to **Block with Edge WAF**.

## Further Reading

{{< partial name="whats-next/whats-next.html" >}}


[1]: https://app.datadoghq.com/services?lens=Security
[2]: https://app.datadoghq.com/security?query=%40workflow.rule.type%3A%22Application%20Security%22&column=time&order=desc&product=appsec&viz=stream&start=1694726477747&end=1695331277747&paused=false
[4]: /service_management/incident_management/
[5]: /service_management/workflows/
[6]: /service_management/case_management/
[7]: https://app.datadoghq.com/security/appsec?
[8]: /security/notifications/rules/
[9]: /account_management/rbac/permissions/#cloud-security-platform
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading