-
Notifications
You must be signed in to change notification settings - Fork 1.2k
Workload Protection's new Coverage feature #31134
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Open
michaelcretzman
wants to merge
11
commits into
master
Choose a base branch
from
mcretzman/DOCS-11460-workload-protection-coverage-map
base: master
Could not load branches
Branch not found: {{ refName }}
Loading
Could not load tags
Nothing to show
Loading
Are you sure you want to change the base?
Some commits from the old base branch may be removed from the timeline,
and old review comments may become outdated.
Open
Changes from all commits
Commits
Show all changes
11 commits
Select commit
Hold shift + click to select a range
fa65e0a
draft
michaelcretzman dcd1619
final pass
michaelcretzman 249e550
Delete go.sum
michaelcretzman 2a7c013
Merge branch 'master' into mcretzman/DOCS-11460-workload-protection-c…
michaelcretzman 6b5747d
updating these files with master
michaelcretzman 0c22daa
Merge branch 'mcretzman/DOCS-11460-workload-protection-coverage-map' …
michaelcretzman 5f085ef
Removed a modified file from pull request
michaelcretzman 1dc1714
Removed a modified file from pull request
michaelcretzman 2bd2a89
Merge branch 'master' into mcretzman/DOCS-11460-workload-protection-c…
michaelcretzman c74a0b0
incorporating tech review
michaelcretzman dee821d
revising for clarity
michaelcretzman File filter
Filter by extension
Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
33 changes: 33 additions & 0 deletions
33
content/en/security/workload_protection/inventory/_index.md
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,33 @@ | ||
--- | ||
title: Coverage and Posture Management | ||
disable_toc: false | ||
--- | ||
|
||
Actively improve security posture and workload resilience using the Workload Protection [Inventory][1]. | ||
|
||
The Workload Protection **Inventory** tools give security teams a unified, real-time view of workload security posture across all compute environments: hosts, containers, and serverless functions. **Inventory** consolidates asset visibility, protection coverage, and actionable insights so you can identify and remediate gaps before they become exploitable risks. | ||
|
||
Inventory is organized into the following tools: | ||
|
||
- [Hosts & Containers][1]: | ||
* List all physical and virtual hosts and container workloads. | ||
* Filter by environment, enabled features, agent version, etc. | ||
- [Serverless][2]: | ||
* Track coverage for serverless functions | ||
* Filter by environment, enabled features, agent version, etc. | ||
- [Coverage Map][3]: | ||
* View a map of Workload Protection status updated every 1-5 minutes | ||
* Find and prioritize workloads in a warning state | ||
* Filter by policy, rule, or MITRE ATT&CK tactic to locate gaps | ||
* Check for outdated or unhealthy agents | ||
|
||
## Benefits of using Inventory for posture management | ||
|
||
- **Proactive risk reduction:** Spot and fix gaps before attackers can exploit them. | ||
- **Faster incident response:** Pivot from high-level coverage views to specific assets or policies in seconds. | ||
- **Continuous compliance:** Maintain alignment with regulatory and internal security requirements. | ||
- **Cloud-native scalability:** Coverage updates in under 5 minutes keep up with rapidly changing environments. | ||
|
||
[1]: https://app.datadoghq.com/security/workload-protection/inventory/hosts | ||
[2]: https://app.datadoghq.com/security/workload-protection/inventory/serverless | ||
[3]: https://app.datadoghq.com/security/workload-protection/inventory/coverage |
128 changes: 128 additions & 0 deletions
128
content/en/security/workload_protection/inventory/coverage_map.md
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,128 @@ | ||
--- | ||
title: Coverage | ||
disable_toc: false | ||
further_reading: | ||
- link: "security/detection_rules/#mitre-attck-map" | ||
tag: "Documentation" | ||
text: "MITRE ATT&CK map" | ||
- link: "https://app.datadoghq.com/release-notes/review-your-workload-protection-coverage-with-the-coverage-map" | ||
tag: "Release Note" | ||
text: "Review your Workload Protection coverage with the coverage map" | ||
--- | ||
|
||
Workload Protection [Coverage][1] provides a real-time view of security coverage across all your hosts. Use Coverage to assess protection posture, identify gaps, and take immediate action. | ||
|
||
{{< img src="security/cws/workload_protection_coverage_map.png" alt="Leverage the Coverage map to get real time visibility into the workload protection status across all your hosts and see which policies are effectively applied" width="100%">}} | ||
|
||
Coverage consolidates critical protection data into one view so you can: | ||
|
||
* Identify the workloads protected by security agents and policies. | ||
* Detect misconfigurations, outdated agents, and missing rules. | ||
* Validate that detection policies align with security baselines and frameworks like MITRE ATT\&CK. See also, [MITRE ATT&CK map][2]. | ||
* Prioritize remediation for high-risk assets. | ||
|
||
## Key functionality | ||
|
||
* **Real-time visibility**: Coverage updates every five minutes for accurate, current status. | ||
* **Granular filtering**: Search by policy, rule, version, status, tactic, or technique. | ||
* **Direct drill-down**: Drill down from a high-level map to a detailed asset or policy view. | ||
* **Actionable alerts**: Highlight workloads in a warning or failed state so you can respond promptly. | ||
* **Coverage analytics**: Track rule deployment health, stale agents, and configuration issues. | ||
|
||
## Key benefits | ||
|
||
* Reduce blind spots by monitoring for unprotected workloads. | ||
* Shorten detection and response times with direct remediation workflows. | ||
* Maintain continuous compliance and policy alignment. | ||
* Integrate posture checks into CI/CD and infrastructure reviews. | ||
|
||
## Policy statuses | ||
|
||
Hosts are identified with the following colors: | ||
|
||
- Green: all rules in the policies applied to the host have passed. | ||
- Orange: one or more rules in the policies applied to the host are in error. | ||
|
||
Click an orange hexagon to view a host with policy rules in error. | ||
|
||
Policies are displayed with the following statuses: | ||
|
||
- **Fully Loaded:** all of the policy's rules pass. | ||
- **Partially Loaded:** some of the policy's rules fail. | ||
- **Fully Rejected:** the entire policy is failing. | ||
|
||
## Improving workload security using Coverage | ||
|
||
Here are some ways to use Coverage to improve your workload security. | ||
|
||
### Detect and remediate policy deployment issues | ||
|
||
1. In **Incomplete infrastructure coverage**, click **Warning**, and then select the policies in **Security coverage needs attention**. In the coverage map, assets with policy deployment problems are displayed as orange hexagons. | ||
3. Review the list of deployed policies. Policies are highlighted with statuses such as **Partially Loaded**, **Fully Rejected**, etc. | ||
4. In the policy details, do one of the following: | ||
- [Edit a policy][4]. | ||
- View a policy's rule errors, and then [edit them][4] as needed. | ||
5. Redeploy and confirm the fix in the coverage map. | ||
|
||
### Identify assets missing Workload Protection | ||
|
||
**Improve infrastructure coverage** flags assets without full Workload Protection. | ||
|
||
1. In **Improve infrastructure coverage**, click **NO WP**. **NO WP** shows how many hosts are running the Datadog Agent without Workload Protection enabled. | ||
2. Click **Inspect Hosts Without WP**. Fleet Automation appears, allowing you to [set up Workload Protection][3]. | ||
|
||
### Identify assets missing key features | ||
|
||
To find gaps in protection, do the following: | ||
|
||
1. In **Improve infrastructure coverage**, click **INFO** to review the `outdated_agent` flag. The `outdated_agent` flag means an outdated Agent version is running and might not support the latest Workload Protection features. | ||
2. In **Improve infrastructure coverage**, click **NO AGENT**. **NO AGENT** shows how many hosts are not running the Datadog Agent, and therefore can't be evaluated by Workload Protection. | ||
1. Click **Inspect Hosts Without Agent**. The Resource Catalog appears, allowing you to address hosts missing agents. | ||
3. Filter by **Agent Version** to detect outdated agents lacking recent security updates. | ||
4. Update the Agent to ensure complete coverage. | ||
|
||
### Search assets by MITRE ATT&CK techniques and tactics | ||
|
||
In **Filter by tactics, techniques, and policy types**, built-in filters for **Tactics**, **Techniques**, and **Policies** show exactly which parts of the MITRE ATT&CK framework are covered. | ||
|
||
To use these filters to strengthen detection and response alignment with proven MITRE ATT&CK framework threat models, do the following: | ||
|
||
1. Click **Tactics** to filter for high-priority tactics (for example, `TA004-privilege-escalation`, `TA004-persistence`), to ensure those are protected across all hosts. | ||
2. After the map updates for the tactic you selected, click **Techniques** and select a technique to identify gaps in technique coverage for critical systems. | ||
3. Click **Policies** and select a policy type to see the distribution of policies across the filtered infrastructure. | ||
|
||
For information about the MITRE ATT&CK map available in SIEM or Workload Protection, see [MITRE ATT&CK map][2]. | ||
|
||
### Experiment with new rules | ||
|
||
You can use Coverage to test and iterate on custom security rules: | ||
|
||
1. Write and deploy a [new custom rule][4]. | ||
2. In **Coverage**, search for the rule by rule ID, policy ID, or hostname. | ||
3. Confirm that the agent has loaded the rule successfully. | ||
4. If errors appear, review the details, fix the rule, and redeploy. | ||
|
||
## Workload coverage triage and remediation cycle | ||
|
||
As an example of how to use Coverage to triage and remediate coverage issues, here is a sequence that starts by establishing a baseline, closing blind spots, and securing the most critical assets. It then verifies enforcement mechanisms, restores agent health, and aligns detection coverage with known adversary behaviors. Finally, it applies rule updates, confirms effectiveness, and records the state for audit and incident reference. | ||
|
||
1. Do a full environment view to establish baseline coverage status. | ||
2. Focus on assets that appear fully covered. Validate that their policies, rules, and agents are working as intended before addressing visible gaps. This uncovers silent failures in trusted systems that would otherwise be ignored. | ||
3. Identify all unprotected or partially protected workloads. | ||
4. Prioritize assets with the highest business impact and exposure. | ||
5. Verify policy deployment and enforcement on those assets. | ||
6. Check for outdated or unhealthy agents on all remaining workloads. | ||
7. Map current detection coverage to MITRE ATT&CK to find gaps in tactics and techniques. | ||
8. Deploy or update detection rules to close those gaps. | ||
9. Reassess coverage to confirm posture changes took effect. | ||
10. Log the final state for compliance and future comparison. | ||
|
||
|
||
## Further reading | ||
|
||
{{< partial name="whats-next/whats-next.html" >}} | ||
|
||
[1]: https://app.datadoghq.com/security/workload-protection/inventory/coverage | ||
[2]: /security/detection_rules/#mitre-attck-map | ||
[3]: /security/workload_protection/setup/ | ||
[4]: /security/workload_protection/workload_security_rules/custom_rules |
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Oops, something went wrong.
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
we don't have CI/CD integrations here
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
right. What I mean here is using Coverage to check the hosts used in your CI/CD pipeline as part of infra reviews.