Skip to content

Commit da7f596

Browse files
DOCS-9659: Set due date rules (DataDog#26634)
* Add new article * Rename article * Add use case * Minor edits * Update instructions for due date rules * Add Removing due dates section * Add additional reason to removing due dates section * Update types * Add reviewer feedback * Add further reading partial * Move section to correct article * Apply suggestions from code review Co-authored-by: Janine Chan <64388808+janine-c@users.noreply.github.com> * Apply suggestions from code review Co-authored-by: Janine Chan <64388808+janine-c@users.noreply.github.com> --------- Co-authored-by: Janine Chan <64388808+janine-c@users.noreply.github.com>
1 parent f831202 commit da7f596

File tree

6 files changed

+109
-7
lines changed

6 files changed

+109
-7
lines changed

config/_default/menus/main.en.yaml

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5704,6 +5704,11 @@ menu:
57045704
parent: automation_pipelines
57055705
identifier: automation_pipelines_inbox
57065706
weight: 10002
5707+
- name: Set Due Date Rules
5708+
url: security/automation_pipelines/set_due_date
5709+
parent: automation_pipelines
5710+
identifier: automation_pipelines_due_date
5711+
weight: 10003
57075712
- name: Security Inbox
57085713
url: security/security_inbox
57095714
parent: security_platform

content/en/security/automation_pipelines/_index.md

Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,9 @@ further_reading:
99
- link: "/security/automation_pipelines/security_inbox"
1010
tag: "Documentation"
1111
text: "Add to Security Inbox Rules"
12+
- link: "/security/automation_pipelines/set_due_date"
13+
tag: "Documentation"
14+
text: "Set Due Date Rules"
1215
---
1316

1417
{{< callout btn_hidden="true">}}
@@ -19,6 +22,8 @@ further_reading:
1922

2023
Automation Pipelines allows you to set up automated rules for newly discovered vulnerabilities, thus accelerating triage and remediation efforts at scale.
2124

25+
{{< img src="security/automation_pipelines/vulnerabilities_settings.png" alt="Automation Vulnerabilities Settings page" width="100%">}}
26+
2227
## Availability
2328

2429
Automation Pipelines is available for:
@@ -57,6 +62,14 @@ Customize the Security Inbox by defining specific conditions that determine whic
5762
- **Strengthen compliance and address key system concerns**: Address concerns affecting regulatory compliance or important business systems, regardless of severity.
5863
- **Prioritize current risks**: Focus on immediate threats, such as identity risks after an incident, or industry-wide vulnerabilities.
5964

65+
### Set due dates for vulnerabilities to align with your security SLOs
66+
67+
Assign deadlines for vulnerability remediation to ensure compliance and improve team accountability. This allows you to:
68+
69+
- **Align with compliance frameworks**: Automatically set due dates that conform to industry regulations like FedRAMP or PCI.
70+
- **Enhance accountability**: Utilize security SLOs to hold teams responsible for timely vulnerability remediation, reducing the administrative burden of follow-ups and status checks.
71+
- **Facilitate proactive risk management**: Encourage prompt action on vulnerabilities to mitigate the risk of exploitation, leveraging SLOs as a strategic tool to prioritize and expedite security tasks.
72+
6073
## Further reading
6174

6275
{{< partial name="whats-next/whats-next.html" >}}

content/en/security/automation_pipelines/mute.md

Lines changed: 22 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,10 @@
22
title: Mute Rules
33
aliases:
44
- /security/vulnerability_pipeline/mute
5+
further_reading:
6+
- link: "/security/automation_pipelines"
7+
tag: "Documentation"
8+
text: "Automation Pipelines"
59
---
610

711
{{< callout url="https://www.datadoghq.com/product-preview/security-automation-pipelines/" >}}
@@ -13,19 +17,33 @@ Configure mute rules to streamline security alerts by automatically filtering ou
1317
## Create a mute rule
1418

1519
1. On the [Automation Pipelines][2] page, click **Add a New Rule** and select **Mute**.
16-
1. Enter a descriptive name for the rule, for example, Cloud Infrastructure Anomaly Warnings.
20+
1. Enter a descriptive name for the rule, for example, **Cloud Infrastructure Anomaly Warnings**.
1721
1. Use the following boxes to configure the rule criteria:
18-
- **Any of these types**: The types of findings that the rule should check for. Available types include **Misconfiguration**, **Attack Path**, **Identity Risk**, and **API Security Finding**.
22+
- **Any of these types**: The types of findings that the rule should check for. Available types include:
23+
- **Misconfiguration**
24+
- **Attack Path**
25+
- **Identity Risk**
26+
- **API Security Finding**
1927
- **Any of these tags or attributes**: The resource tags or attributes that must match for the rule to apply.
2028
1. To add severity criteria to the rule, click **Add Severity**.
2129
1. Specify the mute reason and duration:
22-
- **Reason for muting**: The reason for muting the finding. Available reasons include **False Positive**, **Risk Accepted**, **Pending Fix**, **No Fix**, **Duplicate**, and **Other**.
30+
- **Reason for muting**: The reason for muting the finding. Available reasons include:
31+
- **False Positive**
32+
- **Risk Accepted**
33+
- **Pending fix**
34+
- **No Fix**
35+
- **Duplicate**
36+
- **Other**
2337
- **Rule expiration**: The date on which the rule expires.
2438
- **Further description for muting reason**: Optional box for additional details.
25-
1. Click **Save**.
39+
1. Click **Save**. The rule applies to new findings immediately and starts checking existing findings within the next hour.
2640

2741
## Rule matching order
2842

2943
When Datadog identifies a vulnerability, it evaluates the vulnerability against your sequence of mute rules. Starting with the first rule, if there's a match, Datadog mutes the vulnerability for the specified duration and stops evaluating further. If no match occurs, Datadog moves to the next rule. This process continues until a match is found or all rules are checked without a match.
3044

45+
## Further reading
46+
47+
{{< partial name="whats-next/whats-next.html" >}}
48+
3149
[2]: https://app.datadoghq.com/security/configuration/pipeline-vulnerability

content/en/security/automation_pipelines/security_inbox.md

Lines changed: 10 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,9 @@ further_reading:
66
- link: "/security/security_inbox"
77
tag: "Documentation"
88
text: "Security Inbox"
9+
- link: "/security/automation_pipelines"
10+
tag: "Documentation"
11+
text: "Automation Pipelines"
912
---
1013

1114
{{< callout url="https://www.datadoghq.com/product-preview/customize-your-security-inbox/" >}}
@@ -17,12 +20,16 @@ Configure inbox rules to manage your Security Inbox effectively, ensuring only t
1720
## Create an inbox rule
1821

1922
1. On the [Automation Pipelines][2] page, click **Add a New Rule** and select **Add to Security Inbox**.
20-
1. Enter a descriptive name for the rule, for example, Cloud Infrastructure Anomaly Warnings.
23+
1. Enter a descriptive name for the rule, for example, **Cloud Infrastructure Anomaly Warnings**.
2124
1. Use the following boxes to configure the rule criteria:
22-
- **Any of these types**: The types of findings that the rule should check for. Available types include **Misconfiguration**, **Attack Path**, **Identity Risk**, and **API Security Finding**.
25+
- **Any of these types**: The types of findings that the rule should check for. Available types include:
26+
- **Misconfiguration**
27+
- **Attack Path**
28+
- **Identity Risk**
29+
- **API Security Finding**
2330
- **Any of these tags or attributes**: The resource tags or attributes that must match for the rule to apply.
2431
1. To add severity criteria to the rule, click **Add Severity**.
25-
1. Click **Save**.
32+
1. Click **Save**. The rule applies to new findings immediately and starts checking existing findings within the next hour.
2633

2734
## Rule matching order
2835

Lines changed: 59 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,59 @@
1+
---
2+
title: Set Due Date Rules
3+
further_reading:
4+
- link: "/security/automation_pipelines"
5+
tag: "Documentation"
6+
text: "Automation Pipelines"
7+
---
8+
9+
{{< callout url="https://www.datadoghq.com/product-preview/security-automation-pipelines/" >}}
10+
Automation Pipelines is in Preview. To enroll in the Preview for due date rules, click <strong>Request Access</strong>.
11+
{{< /callout >}}
12+
13+
Configure due date rules to ensure vulnerabilities are addressed within your specified SLO time frames. By setting these due dates, you can automate accountability, meet compliance requirements, and prioritize the prompt remediation of security issues, thereby preventing potential exploitation.
14+
15+
## Create a due date rule
16+
17+
1. On the [Automation Pipelines][2] page, click **Add a New Rule** and select **Set Due Date**.
18+
1. Enter a descriptive name for the rule, for example, **Cloud Infrastructure Anomaly Warnings**.
19+
1. Use the following boxes to configure the rule criteria:
20+
- **Any of these types**: The types of findings that the rule should check for. Available types include:
21+
- **Application Code Vulnerability**
22+
- **Application Library Vulnerability**
23+
- **Container Image Vulnerability**
24+
- **Misconfiguration**
25+
- **Attack Path**
26+
- **Identity Risk**
27+
- **API Security Finding**
28+
- **Any of these tags or attributes**: The resource tags or attributes that must match for the rule to apply.
29+
1. Set a due date for each severity level that requires one, effective from the discovery of a matching severity vulnerability.
30+
1. Click **Save**. The rule applies to new findings immediately and starts checking existing findings within the next hour.
31+
32+
## Where due dates appear
33+
34+
When a finding has a due date, you can see it in these locations:
35+
36+
- Explorer facets
37+
- Findings side panel
38+
- Notifications
39+
- Jira ticket descriptions
40+
- Reporting metrics (as an "overdue" Boolean) to identify teams or repositories with the most overdue vulnerabilities
41+
42+
## Rule matching order
43+
44+
When Datadog identifies a vulnerability, it evaluates the vulnerability against your sequence of due date rules. Starting with the first rule, if there's a match, Datadog sets a due date on the vulnerability for the specified duration and stops evaluating further. If no match occurs, Datadog moves to the next rule. This process continues until a match is found or all rules are checked without a match.
45+
46+
## Removing due dates
47+
48+
When managing vulnerabilities, due dates can be removed under various conditions, such as:
49+
50+
- The detection rule that triggered the vulnerability passes successfully.
51+
- The vulnerability is muted, either manually or automatically through a mute rule.
52+
- The due date rule associated with the vulnerability is disabled or deleted.
53+
- The associated due date rule is modified so that its criteria no longer match the vulnerability.
54+
55+
## Further reading
56+
57+
{{< partial name="whats-next/whats-next.html" >}}
58+
59+
[2]: https://app.datadoghq.com/security/configuration/pipeline-vulnerability
455 KB
Loading

0 commit comments

Comments
 (0)