Skip to content
Merged
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
50 changes: 49 additions & 1 deletion content/en/security/guide/_index.md
Original file line number Diff line number Diff line change
Expand Up @@ -7,4 +7,52 @@ disable_toc: true
{{< whatsnext desc="General Guides:" >}}
{{< nextlink href="/security/guide/aws_fargate_config_guide" >}}AWS Fargate Configuration Guide for Datadog Security{{< /nextlink >}}
{{< nextlink href="/security/guide/byoti_guide" >}}Bring Your Own Threat Intelligence{{< /nextlink >}}
{{< /whatsnext >}}
{{< /whatsnext >}}

{{< whatsnext desc="Cloud SIEM Guides:" >}}
{{< nextlink href="/getting_started/cloud_siem" >}}Getting Started with Cloud SIEM{{< /nextlink >}}
{{< nextlink href="/security/cloud_siem/guide/automate-the-remediation-of-detected-threats" >}}Automate the remediation of detected threats with Cloud SIEM{{< /nextlink >}}
{{< nextlink href="/security/cloud_siem/guide/aws-config-guide-for-cloud-siem" >}}AWS Configuration Guide for Cloud SIEM{{< /nextlink >}}
{{< nextlink href="/security/cloud_siem/guide/google-cloud-config-guide-for-cloud-siem/" >}}Google Cloud Configuration Guide for Cloud SIEM{{< /nextlink >}}
{{< nextlink href="/security/cloud_siem/guide/azure-config-guide-for-cloud-siem/" >}}Azure Configuration Guide for Cloud SIEM{{< /nextlink >}}
{{< nextlink href="security/cloud_siem/guide/monitor-authentication-logs-for-security-threats" >}}Monitor Authentication Logs for Security Threats{{< /nextlink >}}
{{< nextlink href="/security/cloud_siem/guide/how-to-setup-security-filters-using-cloud-siem-api" >}}Security Filters with the Cloud SIEM API{{< /nextlink >}}
{{< /whatsnext >}}

{{< whatsnext desc="Code Security Guides:" >}}
{{< nextlink href="/security/code_security/guides/automate_risk_reduction_sca/" >}}Automate open source risk reduction with Datadog SCA{{< /nextlink >}}
{{< /whatsnext >}}

{{< whatsnext desc="Cloud Security Guides:" >}}
{{< nextlink href="/getting_started/cloud_security_management" >}}First Steps for Cloud Security{{< /nextlink >}}
{{< nextlink href="/security/cloud_security_management/guide/agent_variables" >}}Cloud Security Agent Variables{{< /nextlink >}}
{{< /whatsnext >}}

{{< whatsnext desc="Cloud Security Misconfigurations Guides:" >}}
{{< nextlink href="/security/cloud_security_management/guide/writing_rego_rules" >}}Writing Custom Cloud Security Misconfigurations Rules with Rego{{< /nextlink >}}
{{< nextlink href="/security/cloud_security_management/guide/public-accessibility-logic" >}}How Datadog Determines if Resources are Publicly Accessible{{< /nextlink >}}
{{< nextlink href="/security/cloud_security_management/guide/resource_evaluation_filters" >}}Use Filters to Exclude Resources from Evaluation{{< /nextlink >}}
{{< nextlink href="/security/cloud_security_management/guide/related-logs" >}}View a Misconfiguration's Related Logs{{< /nextlink >}}
{{< /whatsnext >}}

{{< whatsnext desc="App and API Protection Guides:" >}}
{{< nextlink href="/getting_started/application_security/" >}}First steps with App and API Protection{{< /nextlink >}}
{{< nextlink href="/security/application_security/guide/standalone_application_security/" >}}Standalone App and API Protection{{< /nextlink >}}
{{< nextlink href="/security/application_security/guide/manage_account_theft_appsec/" >}}Managing account theft with AAP{{< /nextlink >}}
{{< /whatsnext >}}

{{< whatsnext desc="Workload Protection Guides:" >}}
{{< nextlink href="/security/workload_protection/guide/active-protection" >}}Proactively block crypto mining threats with Active Protection{{< /nextlink >}}
{{< nextlink href="/security/workload_protection/guide/tuning-rules" >}}Best Practices for Fine-Tuning Workload Protection Security Signals{{< /nextlink >}}
{{< nextlink href="/security/workload_protection/secl_auth_guide" >}}Writing custom rule expressions{{< /nextlink >}}
{{< nextlink href="/security/workload_protection/guide/ebpf-free-agent" >}}Threat Detection for Linux Without eBPF Support{{< /nextlink >}}
{{< /whatsnext >}}

{{< whatsnext desc="Sensitive Data Scanner Guides:" >}}
{{< nextlink href="security/sensitive_data_scanner/guide/investigate_sensitive_data_findings" >}}Investigate Sensitive Data Findings{{< /nextlink >}}
{{< nextlink href="security/sensitive_data_scanner/guide/best_practices_for_creating_custom_rules" >}}Best Practices for Creating Custom Rules{{< /nextlink >}}
{{< nextlink href="security/sensitive_data_scanner/guide/redact_all_emails_except_from_specific_domain_logs" >}}Redact all emails except ones from a specific domain in your logs{{< /nextlink >}}
{{< nextlink href="security/sensitive_data_scanner/guide/redact_uuids_in_logs" >}}Redact Universal Unique IDs (UUIDs) in your logs{{< /nextlink >}}
{{< /whatsnext >}}


Loading