Datadog SIEM

Lab 1: Query and Analyze Logs

You're on the DevOps team at Storedog. Your team recently set up Datadog Log Management to ingest, structure, and enrich all logs from the Storedog app.

Customers have reported that the advertisements and discounts aren't appearing in the Storedog app. Your team lead has asked you to use Datadog Log Management to find the source of the errors.

You don't need to fix the errors, but you've been asked to do the following:

  • Find logs that are related to these errors in the advertisements and discounts services of the app.

  • Create a Saved View for the error logs that you can share with your team. The saved view should show the count and percentage of logs grouped by service.

  • Enable the team to search for the file path that the error originates from in the source code.

In this lab activity, you'll do the following to achieve your goals:

  1. Build a search query using relevant facets and search terms

  2. Create a Saved View for log analytics

  3. Add a new facet for the file path attribute

Lab 2: Detect and Investigate Threats with Cloud SIEM

In this lab, you will use Datadog Cloud SIEM to detect real-time threats in an AWS environment.

Imagine that you are part of a team working hard to launch a new SAAS e-learning platform. Your boss has asked you to take the lead on security monitoring for the new application and the cloud environment it runs in.

You recently set up Datadog Cloud SIEM and started ingesting your AWS CloudTrail logs into Datadog for security analysis. You also configured the Cloud SIEM Content Pack for CloudTrail.

You are excited to have Cloud SIEM in place, and you want to practice using it before your app goes live. Throughout this lab, you will use an attack emulation tool to launch an attack against your environment, and then use Cloud SIEM to detect and investigate the attack.

There are two sandbox AWS accounts included in the lab:

  • lab-aws-account: This AWS account hosts the application you are responsible for securing. You will primarily be working in this account throughout the lab.

  • attacker-account: This AWS account represents an adversary AWS account. You will use it to simulate an attack.

Last updated