Datadog’s Cloud Security Posture Management (CSPM) doesn’t just find misconfigurations; it actively prevents them by mapping your cloud environment’s intended state against its actual state.

Let’s see this in action. Imagine you’ve just deployed a new S3 bucket in AWS. By default, it might be public. Datadog CSPM, after being configured to monitor your AWS account, would immediately flag this.

Here’s the workflow:

  1. Ingestion: Datadog pulls configuration data from your cloud provider (AWS, Azure, GCP). This is done via read-only API access, so it’s non-intrusive. For AWS, this means granting permissions to services like Security Hub, Config, and CloudTrail.
  2. Inventory & Mapping: It builds an inventory of all your cloud resources (VMs, databases, storage buckets, IAM roles, network configurations, etc.) and their current settings.
  3. Policy Application: You define security and compliance policies. These can be built-in (like CIS benchmarks, PCI DSS) or custom.
  4. Detection: Datadog continuously compares your actual cloud configuration against these defined policies. If a resource’s setting violates a policy, it’s flagged as a misconfiguration.
  5. Alerting & Remediation: You receive alerts for detected misconfigurations, which can be routed to your existing alerting systems (Slack, PagerDuty). Datadog also offers automated remediation playbooks.

Consider this specific example: an S3 bucket accidentally configured for public read access.

AWS Configuration (What it might look like):

{
    "BucketName": "my-sensitive-data-bucket",
    "ACL": "public-read",
    "Policy": {
        "Version": "2012-10-17",
        "Statement": [
            {
                "Sid": "PublicReadGetObject",
                "Effect": "Allow",
                "Principal": "*",
                "Action": "s3:GetObject",
                "Resource": "arn:aws:s3:::my-sensitive-data-bucket/*"
            }
        ]
    }
}

Datadog CSPM Detection:

Datadog has a built-in rule for "Publicly Accessible S3 Buckets." When it detects the ACL: "public-read" or a bucket policy granting s3:GetObject to Principal: "*", it triggers an alert.

The Mental Model:

Think of your cloud environment as a complex city. Resources are buildings, and their configurations are the doors, windows, and security systems. CSPM acts as a city planner and security guard. It knows what the blueprints should look like (your policies) and constantly patrols, checking if every building’s security is up to code. If a door is left unlocked (public-read S3 bucket), or a window is wide open (unrestricted security group), it immediately raises an alarm.

The power comes from this continuous, automated comparison. Instead of manual audits, which are slow and error-prone, CSPM provides real-time visibility into your security posture. It’s not just about finding vulnerabilities after they’ve been exploited; it’s about preventing them from existing in the first place. This covers a vast range of cloud services:

  • Compute: Open security groups, unencrypted volumes.
  • Storage: Publicly accessible buckets, unencrypted databases.
  • Networking: Exposed load balancers, overly permissive firewall rules.
  • Identity & Access Management (IAM): Overly broad permissions, root user activity.

A common misconception is that CSPM is just an inventory tool. It’s more than that. It’s about contextualizing that inventory against known security best practices and compliance frameworks. For instance, simply knowing you have a database is one thing; knowing that database is publicly accessible and unencrypted, violating PCI DSS, is the critical insight CSPM provides.

The true magic lies in its ability to correlate findings. A misconfigured IAM role might not be an issue on its own, but when linked to a publicly accessible S3 bucket, it becomes a critical path for data exfiltration. Datadog’s graph-based approach to inventory allows it to show these relationships, transforming a list of alerts into a prioritized risk landscape.

The next logical step after identifying and remediating misconfigurations is often understanding the blast radius of a successful exploit, which leads into Datadog’s Cloud Workload Security (CWS) capabilities.

Want structured learning?

Take the full Datadog course →