diff --git a/config/_default/menus/main.en.yaml b/config/_default/menus/main.en.yaml index e3ab897d0a5..ab340e5cfc4 100644 --- a/config/_default/menus/main.en.yaml +++ b/config/_default/menus/main.en.yaml @@ -7122,11 +7122,16 @@ menu: parent: security_platform identifier: security_research_feed weight: 12 + - name: Security MCP Tools + url: security/mcp_server + parent: security_platform + identifier: security_mcp_server + weight: 13 - name: Guides url: security/guide parent: security_platform identifier: security_guides - weight: 13 + weight: 14 - name: Cloud SIEM url: security/cloud_siem/ pre: siem diff --git a/content/en/security/mcp_server.md b/content/en/security/mcp_server.md new file mode 100644 index 00000000000..3f429238a83 --- /dev/null +++ b/content/en/security/mcp_server.md @@ -0,0 +1,103 @@ +--- +title: Security MCP Tools +description: Use AI agents to investigate security signals and analyze security findings with the Datadog MCP Server's security toolset. +further_reading: +- link: "bits_ai/mcp_server/setup" + tag: "Documentation" + text: "Set Up the Datadog MCP Server" +- link: "bits_ai/mcp_server" + tag: "Documentation" + text: "Datadog MCP Server" +- link: "security/threats/security_signals/" + tag: "Documentation" + text: "Security Signals" +- link: "security/guide/findings-schema/?tab=library_vulnerability" + tag: "Documentation" + text: "Security Findings" +algolia: + tags: ["mcp", "mcp server", "security", "security signals", "security findings"] +--- + +## Overview + +The [Datadog MCP Server][1] lets AI agents query your security data through the [Model Context Protocol (MCP)][2]. The `security` toolset gives AI clients like Cursor, Claude Code, and OpenAI Codex access to your security signals and findings, so you can investigate threats and analyze your security posture using natural language. + +
This page covers the security toolset of the remote Datadog MCP Server. For the Code Security MCP Server, which runs locally and scans source code during development, see Code Security MCP Server.
+ +## Quickstart + +The `security` toolset is not enabled by default. To activate it, add `security` to the `toolsets` parameter when connecting to the Datadog MCP Server for your [Datadog site][3]: + +```text +https://mcp.{{< region-param key="dd_site" >}}/api/unstable/mcp-server/mcp?toolsets=core,security +``` + +
Without ?toolsets=security in the URL, the security tools are not available to your AI client — even if the MCP Server is otherwise connected and working.
+ +For client-specific setup instructions (Cursor, Claude Code, VS Code, and others), see [Set Up the Datadog MCP Server][4]. + +## Use cases + +The `security` toolset is useful for: + +- **Triaging security signals**: Ask your AI agent to surface recent high-severity Cloud SIEM signals, App & API Protection alerts, or Workload Protection threats, and get a summary of patterns and affected resources. +- **Analyzing your security posture**: Query findings across Cloud Security with SQL to understand the distribution of misconfigurations, vulnerabilities, and identity risks across your environment. +- **Investigating specific findings**: Retrieve full details for a set of findings to understand scope, affected resources, and remediation context. +- **Correlating signals and findings**: Cross-reference active security signals with open findings to determine whether an alert is tied to a known posture issue. +- **Remediating vulnerabilities with an AI agent**: Pull library vulnerability findings — which include code location and remediation guidance — and pass them to your AI agent to apply patches directly in your codebase. + +## Available tools + +`search_datadog_security_signals` +: Searches and retrieves security signals from Datadog, including Cloud SIEM signals, App & API Protection signals, and Workload Protection signals. Use this to surface and investigate suspicious activity. +: *Permissions required: `Security Signals Read`* + +`security_findings_schema` +: Returns the available fields and their types for security findings. Call this before using `analyze_security_findings` to discover which fields you can filter and group by. Supports filtering by finding type. +: *Permissions required: `Security Monitoring Findings Read`* + +`analyze_security_findings` +: Primary tool for analyzing security findings using SQL. Queries live data from the last 24 hours with support for aggregations, filtering, and grouping. Call `security_findings_schema` first to discover available fields. +: *Permissions required: `Security Monitoring Findings Read`, `Timeseries`* + +`search_security_findings` +: Retrieves full security finding objects. Use this when you need complete finding details or when SQL-based analysis is not sufficient. Prefer `analyze_security_findings` for most analysis tasks. +: *Permissions required: `Security Monitoring Findings Read`* + +## Example prompts + +After you connect, try prompts like: + +**Signals:** +- Show me security signals from the last 24 hours. +- Find high-severity signals related to my production environment. +- List Cloud SIEM signals triggered by suspicious login attempts. + +**Findings:** +- What fields are available for security findings? +- Show me the top 10 rules with the most critical findings. +- Count open findings grouped by severity and finding type. +- Find library vulnerabilities with exploits available, grouped by resource. +- Get full details for critical findings in my AWS environment. +- List all open identity risk findings with full metadata. +- Get open library vulnerability findings with code locations and remediation guidance so I can patch them. + +## Required permissions + +The Datadog role assigned to you must include the following permissions to use each tool: + +| Tool | Required permissions | +|---|---| +| `search_datadog_security_signals` | `Security Signals Read` | +| `security_findings_schema` | `Security Monitoring Findings Read` | +| `analyze_security_findings` | `Security Monitoring Findings Read`, `Timeseries` | +| `search_security_findings` | `Security Monitoring Findings Read` | + +## Further reading + +{{< partial name="whats-next/whats-next.html" >}} + +[1]: /bits_ai/mcp_server/ +[2]: https://modelcontextprotocol.io/ +[3]: /getting_started/site/ +[4]: /bits_ai/mcp_server/setup/