You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/en/security/code_security/_index.md
+26-22
Original file line number
Diff line number
Diff line change
@@ -5,47 +5,51 @@ aliases:
5
5
- /code_analysis/
6
6
---
7
7
8
-
Code Security scans your pre-production code, open source libraries, and repositories to find security vulnerabilities and code quality issues. It encompasses the following capabilities:
8
+
Code Security scans your first-party code and open source libraries used in your applications in both your repositories and running services, providing end-to-end visibility from development to production. It encompasses the following capabilities:
9
9
10
-
-[Static Code Analysis (SAST)][1] for your first-party code
11
-
-[Software Composition Analysis][2] for open source dependencies in your codebase
10
+
-[Static Code Analysis (SAST)][1] for identifying security and quality issues in your first-party code
11
+
-[Software Composition Analysis (SCA)][2] for identifying open source dependencies in both your repositories and your services
12
12
-[Runtime Code Analysis (IAST)][3] for code-level vulnerabilities in your services
13
13
14
-
## Static Code Analysis (SAST)
15
-
16
-
SAST analyzes static pre-production code to identify maintainability and security issues.
17
-
18
-
SAST has benefits for multiple people in your organization:
19
-
14
+
Code Security helps teams implement DevSecOps throughout the organization:
20
15
-**Developers:** early vulnerablity detection, code quality improvements, faster development as developers spend less time debugging and patching.
21
-
-**Site Reliability Engineers (SREs):** system resilience, security compliance, automated security checks as SAST integrates with CI/CD pipelines. Overall, SAST reduces manual overhead for SREs and ensures that each release is thoroughly tested for vulnerabilities.
22
-
-**Administrators:** enhanced security posture, improved patch management in response to early vulnerability alerts, and compliance monitoring.
23
-
-**Support Representatives:** incident prevention, faster issue resolutions, and customer assurance.
16
+
-**Security Administrators:** enhanced security posture, improved patch management in response to early vulnerability alerts, and compliance monitoring.
17
+
-**Site Reliability Engineers (SREs):** automated security checks throughout CI/CD workflow, security compliance, and system resilience. SAST reduces manual overhead for SREs and ensures that each release is thoroughly tested for vulnerabilities.
24
18
25
-
You supports scanning for multiple languages and you can integrate SAST into your development lifecycle using CI providers, source code management tools, and IDEs.
19
+
## Static Code Analysis (SAST)
20
+
Static Code Analysis (SAST) analyzes pre-production code to identify security and quality issues. You can embed best security and development practices throughout the software development lifecycle with:
21
+
- IDE integration to flag violations in real time with deterministic suggested fixes
22
+
- In-line GitHub pull request comments with deterministic suggested fixes and incremental/diff-aware scanning
23
+
- Ability to open a pull request to fix a violation directly from Datadog
26
24
27
-
See [Static Code Analysis Setup][6] for more details.
25
+
Scans can run via your CI/CD pipelines or directly in Datadog with hosted scanning (GitHub-only).
26
+
See [Static Code Analysis Setup][6] to get started.
28
27
29
28
## Software Composition Analysis
29
+
Software Composition Analysis (SCA) analyzes open source libraries in both your repositories and running services. You can track and manage dependencies across the software development lifecycle with:
30
+
- IDE integration to flag vulnerabilities affecting libraries running on your services
31
+
- Ability to open a pull request to fix a library vulnerability directly from Datadog
32
+
- Runtime-informed prioritization of vulnerabilities with the Datadog severity score
30
33
31
-
Software Composition Analysis (SCA) analyzes open source libraries in both your repositories and running services, providing end-to-end visibility of library vulnerabilities and license management from development to production.
32
-
33
-
SCA supports [static][4] and [runtime][5] scanning and provides libraries in the most common languages and technologies.
34
+
SCA supports both static and runtime dependency detection.
35
+
For static scanning, you can scan via your CI/CD pipelines or directly via Datadog with hosted scanning (GitHub-only). See [static setup][4] to get started.
36
+
For runtime vulnerability detection, you can easily enable SCA on your services instrumented with Datadog APM. See [runtime setup][5] to get started.
34
37
35
38
## Runtime Code Analysis (IAST)
39
+
Runtime Code Analysis (IAST) identifies code-level vulnerabilities in your running services. It relies on inspection of legitimate application traffic as opposed to external testing that often requires extra configuration or periodic scheduling. IAST provides an up-to-date view of your attack surface area by:
40
+
- Monitoring your code's interactions with other components of your stack (such as libraries and infrastructure)
41
+
- Providing 100% coverage of the OWASP Top 10
42
+
- Runtime-informed prioritization of vulnerabilities with the Datadog severity score
36
43
37
-
Datadog Runtime Code Analysis (IAST) identifies code-level vulnerabilities in your services and provides actionable insights and recommended fixes.
38
-
39
-
IAST enables Datadog to identify vulnerabilities using legitimate application traffic instead of relying on external tests that could require extra configuration or periodic scheduling. It also monitors your code’s interactions with other components of your stack, such as libraries and infrastructure, providing an up-to-date view of your attack surface area.
40
-
41
-
For a list of supported services, see [Runtime Code Analysis][3].
44
+
You can enable IAST on your services instrumented with Datadog APM. See [IAST setup][3] to get started.
Copy file name to clipboardExpand all lines: content/en/security/code_security/dev_tool_int/github_pull_requests/_index.md
+2-3
Original file line number
Diff line number
Diff line change
@@ -9,9 +9,8 @@ aliases:
9
9
## Overview
10
10
11
11
Code Security integrates with GitHub pull requests in two ways:
12
-
[Pull request comments to flag violations](#enable-code-security-pr-comments-for-your-repositories)
12
+
-[Pull request comments to flag violations](#enable-code-security-pr-comments-for-your-repositories)
13
13
{{< img src="ci/static-analysis-pr-comment-example.png" alt="Example of a Code Security comment on a pull request" style="width:90%;" >}}
14
-
15
14
-[Open a pull request to fix an issue directly from Datadog](#fixing-a-vulnerability-directly-from-datadog): You can create a pull request from the UI to fix a security vulnerability or code quality issue based on Datadog's suggested code fix. This is only available for Static Code Analysis (SAST).
16
15
{{< img src="ci/sast_one_click_light.png" alt="Example of one-click remediation for Code Security" style="width:90%;" >}}
17
16
@@ -21,7 +20,7 @@ To enable these features, ensure you have the required GitHub permissions (Read
21
20
22
21
### Enable Datadog Code Security
23
22
24
-
To use Datadog Code Security, add the appropriate configuration files to your repository, as described in the [setup instructions][1].
23
+
To enable Code Security in-app, navigate to the [**Code Security** page][4].
Copy file name to clipboardExpand all lines: content/en/security/code_security/iast/_index.md
+3-5
Original file line number
Diff line number
Diff line change
@@ -7,15 +7,13 @@ aliases:
7
7
8
8
## Overview
9
9
10
-
Datadog Runtime Code Analysis (IAST) identifies code-level vulnerabilities in your services and provides actionable insights and recommended fixes.
11
-
12
-
For a list of supported services, see the [Library Compatibility Requirements][5].
10
+
Datadog Runtime Code Analysis (IAST) identifies code-level vulnerabilities in your services and provides actionable insights and recommended fixes. For a list of supported services, see the [Library Compatibility Requirements][5].
13
11
14
12
Runtime Code Analysis uses an Interactive Application Security Testing (IAST) approach to find vulnerabilities within your application code based on your Datadog application instrumentation.
15
13
16
14
IAST enables Datadog to identify vulnerabilities using legitimate application traffic instead of relying on external tests that could require extra configuration or periodic scheduling. It also monitors your code’s interactions with other components of your stack, such as libraries and infrastructure, providing an up-to-date view of your attack surface area.
17
15
18
-
The Code Security detection rules support the following languages.
16
+
IAST detection rules support the following languages.
0 commit comments