-
Notifications
You must be signed in to change notification settings - Fork 1.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[DOCS-9921] Add attacker clustering & attacker fingerprint public doc #27194
base: master
Are you sure you want to change the base?
[DOCS-9921] Add attacker clustering & attacker fingerprint public doc #27194
Conversation
Preview links (active after the
|
content/en/security/application_security/threats/attacker-clustering.md
Outdated
Show resolved
Hide resolved
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
For the screenshots provided:
- It's not obvious what the screenshots are illustrating, without context imho. I'd suggest adding some guidance on where to look. E.g. we show a screenshot for detection rule editor -> should be a red box showing that focus should be on the tag part.
- Or if we show the signal sidepanel, a red box should show that the interesting bit is the attacker section at the bottom.
- All of the IPs should be blurred out. IIRC that's the policy for screeenshots showing any kind of IP/user/email information, even if randomly generated.
content/en/security/application_security/threats/attacker-fingerprint.md
Outdated
Show resolved
Hide resolved
content/en/security/application_security/threats/attacker-fingerprint.md
Outdated
Show resolved
Hide resolved
|
||
## Overview | ||
|
||
Datadog Attacker fingerprints are a threat hunting tool. They are automatically computed and added to your traces on attack or login attempts when Application Security Management (ASM) is enabled on your service. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
are a threat hunting tool.
Are they useful for anything outside of attacker clustering?
My intuitive understanding is no - the data is fragmented across many attributes, and those are not very clear how to use manually.
Unless we can share some use cases that don't involve relying on Attacker Clustering, I'd suggest framing this as a feature mainly intended to power attacker clustering.
I'd go even further - if they don't have standalone use cases we can demonstrate, I think this content should be on the Attacker Clustering doc page and not separate.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
We might be able to use it for blocking or more advanced threat hunting (probably requires good example from @Taiki-San) so I would keep it on it's own page. However it's true that at the moment it's only used for clustering so I'll focus the explanation on that
content/en/security/application_security/threats/attacker-clustering.md
Outdated
Show resolved
Hide resolved
content/en/security/application_security/threats/attacker-clustering.md
Outdated
Show resolved
Hide resolved
content/en/security/application_security/threats/attacker-clustering.md
Outdated
Show resolved
Hide resolved
content/en/security/application_security/threats/attacker-clustering.md
Outdated
Show resolved
Hide resolved
content/en/security/application_security/threats/attacker-clustering.md
Outdated
Show resolved
Hide resolved
…tering.md Co-authored-by: Jānis Kiršteins <[email protected]>
…tering.md Co-authored-by: Jānis Kiršteins <[email protected]>
…tering.md Co-authored-by: Jānis Kiršteins <[email protected]>
…tering.md Co-authored-by: Jānis Kiršteins <[email protected]>
…erprint.md Co-authored-by: Jānis Kiršteins <[email protected]>
…erprint.md Co-authored-by: Jānis Kiršteins <[email protected]>
…of github.com:DataDog/documentation into emmanuelle.lejeail/attacker-clustering-fingerprinting
What does this PR do? What is the motivation?
Merge instructions
Merge readiness:
Merge queue is enabled in this repo. To have it automatically merged after it receives the required reviews, create the PR (from a branch that follows the
<yourname>/description
naming convention) and then add the following PR comment:Additional notes