Skip to content
17 changes: 11 additions & 6 deletions config/_default/menus/main.en.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -6107,36 +6107,41 @@ menu:
parent: cloud_siem
identifier: cloud_siem_default_rules
weight: 4
- name: Threat Intelligence
url: /security/cloud_siem/threat_intelligence
parent: cloud_siem
identifier: cloud_siem_threat_intelligence
weight: 5
- name: Investigate Security Signals
url: /security/cloud_siem/investigate_security_signals
parent: cloud_siem
identifier: cloud_siem_investigate_security_signals
weight: 5
weight: 6
- name: Investigator
url: security/cloud_siem/investigator
parent: cloud_siem
identifier: cloud_siem_investigator
weight: 6
weight: 7
- name: Historical Jobs
url: security/cloud_siem/historical_jobs
parent: cloud_siem
identifier: cloud_siem_log_historical_jobs
weight: 7
weight: 8
- name: Risk Insights
url: security/cloud_siem/entities_and_risk_scoring
parent: cloud_siem
identifier: cloud_siem_entities_and_risk_scoring
weight: 8
weight: 9
- name: Security Operational Metrics
url: security/cloud_siem/security_operational_metrics/
parent: cloud_siem
identifier: siem_security_operational_metrics
weight: 9
weight: 10
- name: Guides
url: security/cloud_siem/guide/
parent: cloud_siem
identifier: siem_guides
weight: 10
weight: 11
- name: Cloud Security
url: security/cloud_security_management
parent: security_platform_heading
Expand Down
102 changes: 102 additions & 0 deletions content/en/security/cloud_siem/threat_intelligence.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,102 @@
---
title: Threat Intelligence
disable_toc: false
further_reading:
- link: "security/cloud_siem/detection_rules"
tag: "Documentation"
text: "Create custom detection rules"
---

## Overview

Datadog provides built-in [threat intelligence][1] for Cloud SIEM logs. This article explains how to extend that functionality by enriching logs with your own custom threat intelligence feeds.

## Bring your own threat intelligence

Cloud SIEM supports enriching and searching logs using threat intelligence indicators of compromise (IOCs) stored in Datadog reference tables. [Reference Tables][7] allow you to combine metadata with information already in Datadog.

### Storing indicators of compromise in reference tables

Threat intelligence is supported in the CSV format, and requires a table for each Indicator type (for example, IP address) and requires the following columns:

#### CSV structure for IP address

| Field | Data | Description | Required | Example |
|-------------------|-------|-------------------------------------------------------------------------------------------------|----------|----------------------------------|
| ip_address | text | The primary key for the reference table in the IPv4 dot notation format. | true | 192.0.2.1 |
| additional_data | json | Additional data to enrich the logs. | false | `{"ref":"hxxp://example.org"}` |
| category | text | The threat intel [category][8]. This is used by some out-of-the-box detection rules. | true | Malware |
| intention | text | The threat intel [intent][9]. This is used by some out-of-the-box detection rules. | true | malicious |
| source | text | The name of the source and the link to its site, such as your team and your team's wiki. | true | `{"name":"internal_security_team", "url":"https://teamwiki.example.org"}` |

<div class="alert alert-info">JSON in a CSV requires double quoting. The following is an example CSV.</div>

```
ip_address,additional_data,category,intention,source
192.0.2.1,"{""ref"":""hxxp://example.org""}",scanner,suspicious,"{""name"":""internal_security_team"", ""url"":""https://teamwiki.example.org""}"
192.0.2.2,"{""ref"":""hxxp://example.org""}",scanner,suspicious,"{""name"":""internal_security_team"", ""url"":""https://teamwiki.example.org""}"
192.0.2.3,"{""ref"":""hxxp://example.org""}",scanner,suspicious,"{""name"":""internal_security_team"", ""url"":""https://teamwiki.example.org""}"
```

### Uploading and enabling your own threat intelligence

Datadog supports creating reference tables either by a manual upload or by periodically retrieving the data from Amazon S3, Azure storage, or Google Cloud storage.

**Notes**:
- It can take 10 to 30 minutes to start enriching Logs after creating a table.
- If a primary key is duplicated, it is skipped and an error message about the key is displayed.

On a new [reference table][2] page:

1. Name the table. The table name is referenced in the Threat Intelligence setting.
1. Upload a local CSV or import a CSV from a cloud storage bucket. The file is normalized and validated.
1. Preview the table schema and choose the IOC column as the Primary Key.
1. Save the table.
1. In [Threat Intel][3], locate the new table and toggle it on to enable it.

#### Using cloud storage

When the reference table is created from cloud storage, it is refreshed periodically. The entire table is replaced. Data is not merged.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
When the reference table is created from cloud storage, it is refreshed periodically. The entire table is replaced. Data is not merged.
When a reference table is created from cloud storage, it is refreshed periodically by replacing the entire table**data is not merged**.


See the related reference table documentation for:

- [Amazon S3][4]
- [Azure storage][5]
- [Google Cloud storage][6]

#### Troubleshooting cloud imports

If a reference table is not refreshing, open the reference table's settings menu and select **View Change Events**.

**View Change Events** opens a page in **Event Management** showing potential error events for the ingestion. You can also filter in **Event Management** using the reference table name.

In Datadog Event Management, it may appear that data has been fetched from the cloud, but it can take a few additional minutes for those changes to propagate to Threat Intelligence. Other useful cloud import details to remember:

- The expected latency before updated enrichments are available when a source is uploaded or updated is 10 to 30 minutes.
- How to know when the updates are applied: The changes are visible in the reference table or in the logs. Select the **View Change Events** link from settings on the reference table detail page to see the related events.
- The update replaces the entire table with the new data.
In case of a duplicated primary key, the rows with the duplicated key are not written, and an error is shown in the reference table detail page.

## Threat intelligence in the user interface

To enable Cloud SIEM threat intelligence data for reference tables:
1. Navigate to [Threat Intelligence][3].
1. For the table you want to see Cloud SIEM threat intelligence data, click the dropdown menu in the **Enabled** column and select Cloud SIEM.

After applying a reference table to Cloud SIEM, all incoming logs are evaluated against the table using a specific Indicator of Compromise (IoC) key, such as an IP address. If a match is found, the log is enriched with relevant Threat Intelligence (TI) attributes from the table, which enhances detection, investigation, and response.

A threat intelligence reference table can be shared across multiple security products.

## Further reading

{{< partial name="whats-next/whats-next.html" >}}

[1]: /security/threat_intelligence/#threat-intelligence-sources
[2]: https://app.datadoghq.com/reference-tables/create
[3]: https://app.datadoghq.com/security/configuration/threat-intel
[4]: /reference_tables/?tab=amazons3#create-a-reference-table
[5]: /reference_tables/?tab=azurestorage#create-a-reference-table
[6]: /reference_tables/?tab=googlecloudstorage#create-a-reference-table
[7]: /reference_tables/
[8]: /security/threat_intelligence/#threat-intelligence-categories
[9]: /security/threat_intelligence/#threat-intelligence-intents
4 changes: 4 additions & 0 deletions content/en/security/threat_intelligence.md
Original file line number Diff line number Diff line change
Expand Up @@ -7,6 +7,10 @@ further_reading:
- link: "/security/application_security/threats/threat-intelligence/"
tag: "documentation"
text: "AAP Threat Intelligence"
- link: "/security/cloud_siem/threat_intelligence/"
tag: "documentation"
text: "Cloud SIEM Threat Intelligence"

products:
- name: Cloud SIEM
url: /security/cloud_siem/
Expand Down
Loading