Skip to content

Workload Protection's new Coverage feature #31134

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
wants to merge 11 commits into
base: master
Choose a base branch
from
Open
12 changes: 11 additions & 1 deletion config/_default/menus/main.en.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -6187,11 +6187,21 @@ menu:
parent: workload_protection_agent_expressions
identifier: windows_expressions
weight: 2
- name: Coverage and Posture Management
url: security/workload_protection/inventory
parent: workload_protection
identifier: workload_protection_inventory
weight: 205
- name: Coverage
url: security/workload_protection/inventory/coverage_map
parent: workload_protection_inventory
identifier: workload_protection_coverage_map
weight: 1
- name: Guides
url: security/workload_protection/guide
parent: workload_protection
identifier: workload_protection_guides
weight: 205
weight: 206
- name: Troubleshooting
url: security/workload_protection/troubleshooting/threats
parent: workload_protection
Expand Down
5 changes: 5 additions & 0 deletions content/.gitignore
Original file line number Diff line number Diff line change
@@ -1,4 +1,9 @@

# This file lists compiled Cdocs files to keep them out of version control. For more information, see the internal Cdocs documentation: https://datadoghq.atlassian.net/wiki/spaces/docs4docs/pages/4898063037/Cdocs+Build

# For the list of files to ignore in the documentation repo, see the version in the root of the documentation repository: https://github.com/DataDog/documentation/blob/master/.gitignore


/en/product_analytics/session_replay/mobile/setup_and_configuration.md
/en/real_user_monitoring/guide/proxy-mobile-rum-data.md
/en/real_user_monitoring/guide/proxy-rum-data.md
Expand Down
33 changes: 33 additions & 0 deletions content/en/security/workload_protection/inventory/_index.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,33 @@
---
title: Coverage and Posture Management
disable_toc: false
---

Actively improve security posture and workload resilience using the Workload Protection [Inventory][1].

The Workload Protection **Inventory** tools give security teams a unified, real-time view of workload security posture across all compute environments: hosts, containers, and serverless functions. **Inventory** consolidates asset visibility, protection coverage, and actionable insights so you can identify and remediate gaps before they become exploitable risks.

Inventory is organized into the following tools:

- [Hosts & Containers][1]:
* List all physical and virtual hosts and container workloads.
* Filter by environment, enabled features, agent version, etc.
- [Serverless][2]:
* Track coverage for serverless functions
* Filter by environment, enabled features, agent version, etc.
- [Coverage Map][3]:
* View a map of Workload Protection status updated every 1-5 minutes
* Find and prioritize workloads in a warning state
* Filter by policy, rule, or MITRE ATT&CK tactic to locate gaps
* Check for outdated or unhealthy agents

## Benefits of using Inventory for posture management

- **Proactive risk reduction:** Spot and fix gaps before attackers can exploit them.
- **Faster incident response:** Pivot from high-level coverage views to specific assets or policies in seconds.
- **Continuous compliance:** Maintain alignment with regulatory and internal security requirements.
- **Cloud-native scalability:** Coverage updates in under 5 minutes keep up with rapidly changing environments.

[1]: https://app.datadoghq.com/security/workload-protection/inventory/hosts
[2]: https://app.datadoghq.com/security/workload-protection/inventory/serverless
[3]: https://app.datadoghq.com/security/workload-protection/inventory/coverage
128 changes: 128 additions & 0 deletions content/en/security/workload_protection/inventory/coverage_map.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,128 @@
---
title: Coverage
disable_toc: false
further_reading:
- link: "security/detection_rules/#mitre-attck-map"
tag: "Documentation"
text: "MITRE ATT&CK map"
- link: "https://app.datadoghq.com/release-notes/review-your-workload-protection-coverage-with-the-coverage-map"
tag: "Release Note"
text: "Review your Workload Protection coverage with the coverage map"
---

Workload Protection [Coverage][1] provides a real-time view of security coverage across all your hosts. Use Coverage to assess protection posture, identify gaps, and take immediate action.

{{< img src="security/cws/workload_protection_coverage_map.png" alt="Leverage the Coverage map to get real time visibility into the workload protection status across all your hosts and see which policies are effectively applied" width="100%">}}

Coverage consolidates critical protection data into one view so you can:

* Identify the workloads protected by security agents and policies.
* Detect misconfigurations, outdated agents, and missing rules.
* Validate that detection policies align with security baselines and frameworks like MITRE ATT\&CK. See also, [MITRE ATT&CK map][2].
* Prioritize remediation for high-risk assets.

## Key functionality

* **Real-time visibility**: Coverage updates every five minutes for accurate, current status.
* **Granular filtering**: Search by policy, rule, version, status, tactic, or technique.
* **Direct drill-down**: Drill down from a high-level map to a detailed asset or policy view.
* **Actionable alerts**: Highlight workloads in a warning or failed state so you can respond promptly.
* **Coverage analytics**: Track rule deployment health, stale agents, and configuration issues.

## Key benefits

* Reduce blind spots by monitoring for unprotected workloads.
* Shorten detection and response times with direct remediation workflows.
* Maintain continuous compliance and policy alignment.
* Integrate posture checks into CI/CD and infrastructure reviews.

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

we don't have CI/CD integrations here

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

right. What I mean here is using Coverage to check the hosts used in your CI/CD pipeline as part of infra reviews.


## Policy statuses

Hosts are identified with the following colors:

- Green: all rules in the policies applied to the host have passed.
- Orange: one or more rules in the policies applied to the host are in error.

Click an orange hexagon to view a host with policy rules in error.

Policies are displayed with the following statuses:

- **Fully Loaded:** all of the policy's rules pass.
- **Partially Loaded:** some of the policy's rules fail.
- **Fully Rejected:** the entire policy is failing.

## Improving workload security using Coverage

Here are some ways to use Coverage to improve your workload security.

### Detect and remediate policy deployment issues

1. In **Incomplete infrastructure coverage**, click **Warning**, and then select the policies in **Security coverage needs attention**. In the coverage map, assets with policy deployment problems are displayed as orange hexagons.
3. Review the list of deployed policies. Policies are highlighted with statuses such as **Partially Loaded**, **Fully Rejected**, etc.
4. In the policy details, do one of the following:
- [Edit a policy][4].
- View a policy's rule errors, and then [edit them][4] as needed.
5. Redeploy and confirm the fix in the coverage map.

### Identify assets missing Workload Protection

**Improve infrastructure coverage** flags assets without full Workload Protection.

1. In **Improve infrastructure coverage**, click **NO WP**. **NO WP** shows how many hosts are running the Datadog Agent without Workload Protection enabled.
2. Click **Inspect Hosts Without WP**. Fleet Automation appears, allowing you to [set up Workload Protection][3].

### Identify assets missing key features

To find gaps in protection, do the following:

1. In **Improve infrastructure coverage**, click **INFO** to review the `outdated_agent` flag. The `outdated_agent` flag means an outdated Agent version is running and might not support the latest Workload Protection features.
2. In **Improve infrastructure coverage**, click **NO AGENT**. **NO AGENT** shows how many hosts are not running the Datadog Agent, and therefore can't be evaluated by Workload Protection.
1. Click **Inspect Hosts Without Agent**. The Resource Catalog appears, allowing you to address hosts missing agents.
3. Filter by **Agent Version** to detect outdated agents lacking recent security updates.
4. Update the Agent to ensure complete coverage.

### Search assets by MITRE ATT&CK techniques and tactics

In **Filter by tactics, techniques, and policy types**, built-in filters for **Tactics**, **Techniques**, and **Policies** show exactly which parts of the MITRE ATT&CK framework are covered.

To use these filters to strengthen detection and response alignment with proven MITRE ATT&CK framework threat models, do the following:

1. Click **Tactics** to filter for high-priority tactics (for example, `TA004-privilege-escalation`, `TA004-persistence`), to ensure those are protected across all hosts.
2. After the map updates for the tactic you selected, click **Techniques** and select a technique to identify gaps in technique coverage for critical systems.
3. Click **Policies** and select a policy type to see the distribution of policies across the filtered infrastructure.

For information about the MITRE ATT&CK map available in SIEM or Workload Protection, see [MITRE ATT&CK map][2].

### Experiment with new rules

You can use Coverage to test and iterate on custom security rules:

1. Write and deploy a [new custom rule][4].
2. In **Coverage**, search for the rule by rule ID, policy ID, or hostname.
3. Confirm that the agent has loaded the rule successfully.
4. If errors appear, review the details, fix the rule, and redeploy.

## Workload coverage triage and remediation cycle

As an example of how to use Coverage to triage and remediate coverage issues, here is a sequence that starts by establishing a baseline, closing blind spots, and securing the most critical assets. It then verifies enforcement mechanisms, restores agent health, and aligns detection coverage with known adversary behaviors. Finally, it applies rule updates, confirms effectiveness, and records the state for audit and incident reference.

1. Do a full environment view to establish baseline coverage status.
2. Focus on assets that appear fully covered. Validate that their policies, rules, and agents are working as intended before addressing visible gaps. This uncovers silent failures in trusted systems that would otherwise be ignored.
3. Identify all unprotected or partially protected workloads.
4. Prioritize assets with the highest business impact and exposure.
5. Verify policy deployment and enforcement on those assets.
6. Check for outdated or unhealthy agents on all remaining workloads.
7. Map current detection coverage to MITRE ATT&CK to find gaps in tactics and techniques.
8. Deploy or update detection rules to close those gaps.
9. Reassess coverage to confirm posture changes took effect.
10. Log the final state for compliance and future comparison.


## Further reading

{{< partial name="whats-next/whats-next.html" >}}

[1]: https://app.datadoghq.com/security/workload-protection/inventory/coverage
[2]: /security/detection_rules/#mitre-attck-map
[3]: /security/workload_protection/setup/
[4]: /security/workload_protection/workload_security_rules/custom_rules
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading