Home / Companies / Datadog / Blog / Post Details
Content Deep Dive

Threat modeling with Datadog Application Security Management

Blog post from Datadog

Post Details
Company
Date Published
Author
Izar Tarandach, Karishma Asthana, Mallory Mooney
Word Count
1,281
Language
English
Hacker News Points
-
Summary

Threat modeling is a critical component of building high-performing and secure systems. It involves analyzing representations of a system to highlight concerns about security and privacy characteristics, requiring two main steps: system modeling and threat elicitation. However, developing effective threat models can be challenging due to gaps in visibility into system components, data flows between systems, discrepancies between design and implementation, lack of documentation, and unclear ownership. Datadog Application Security Management (ASM) addresses these gaps by providing a comprehensive view of an organization's entire system, including new integrations, and enabling the identification of threats through distributed tracing, visualization of system dependencies, and service owners. By leveraging ASM, organizations can develop accurate threat models that anticipate the flow of potential attacks, identify vulnerabilities, and provide mitigation strategies to strengthen security for their systems as needed.