Skip to content
Home RASP Tools Datadog Application Security
Datadog Application Security

Datadog Application Security

Category: RASP
License: Commercial
Suphi Cankurt
Suphi Cankurt
AppSec Enthusiast
Updated February 20, 2026
4 min read
Key Takeaways
  • Datadog ASM embeds RASP capabilities directly into APM tracing libraries across Java, .NET, Node.js, Python, Go, Ruby, and PHP.
  • RASP engine originates from Sqreen acquisition, providing in-app WAF and real-time attack blocking without separate agents.
  • Shadow API discovery detects undocumented endpoints by analyzing actual traffic, with OWASP API Top 10 coverage.
  • Account Takeover protection and distributed tracing integration tie security events to full application request traces.

Datadog Application Security (now branded App and API Protection) provides runtime application protection integrated with Datadog’s observability platform. It uses the same tracing libraries as Datadog APM to embed RASP capabilities directly into application code across 7 languages.

Datadog App and API Protection overview showing attack detection across services

What is Datadog Application Security?

Datadog ASM embeds security protection into applications using the same tracing libraries that power Datadog APM. If you already run Datadog APM, enabling ASM typically requires only a configuration flag change — no separate agent or network appliance.

The RASP capabilities come from Datadog’s 2021 acquisition of Sqreen. The technology operates inside the application runtime, with visibility into how requests flow through code. It blocks attacks before they reach vulnerable code paths.

When an attack is detected, security teams see the attack signature alongside the full distributed trace, the services affected, the user responsible, and the code paths involved.

In-App WAF
Operates inside the application runtime rather than at the network perimeter. Sees requests after TLS termination and understands application context like user sessions.
APM Integration
Links every security event to a distributed trace. Follow a malicious request from ingress through every microservice it touched.
API Discovery
Continuously discovers all API endpoints including undocumented and shadow APIs. Detects OWASP API Top 10 risks.

Key features

FeatureDetails
LanguagesJava, .NET, Node.js, Python, Go, Ruby, PHP
DeploymentIn-app (tracer-based) or perimeter (edge WAF/CDN)
DetectionOWASP Top 10: SQLi, XSS, command injection, SSRF, path traversal
BlockingReal-time blocking of requests, users, or IPs at edge or in-app
API securityShadow API discovery, OWASP API Top 10 detection
Business logicAccount Takeover and Credential Stuffing detection
ObservabilitySecurity events linked to distributed traces, logs, and APM metrics
EnablementDD_APPSEC_ENABLED=true flag on existing APM tracing libraries

In-app WAF

The in-app WAF operates inside your application rather than at the network perimeter.

This positioning provides several advantages:

  • Sees requests after TLS termination without additional decryption
  • Understands application context like user sessions and business logic
  • Blocks attacks that network WAFs miss due to encoding or evasion techniques
  • Works in environments where network-based WAFs are impractical (microservices, serverless)

Detection rules cover the OWASP Top 10 including SQL injection, XSS, command injection, path traversal, and SSRF.

Custom rules can be created to address application-specific threats.

Distributed tracing integration

When an attack is detected, Datadog ASM links the security event to the corresponding distributed trace.

This integration shows:

  • The complete request path through your microservices
  • Latency impact of the malicious request
  • Database queries and external API calls triggered
  • The specific code functions that processed the malicious input

Security teams investigating an incident can follow the request from ingress through every service it touched, understanding exactly what the attacker accessed.

Threat intelligence and user tracking

Datadog account takeover detection showing credential stuffing and suspicious login patterns

Datadog ASM correlates attacks with threat intelligence feeds to identify known malicious actors.

User tracking associates security events with authenticated users, enabling:

  • Identification of accounts engaged in suspicious behavior
  • Detection of credential stuffing using known breached credentials
  • Account lockout recommendations based on attack patterns
  • Attribution of attacks to specific users for forensic purposes
No separate agent needed
If you already run Datadog APM, enabling ASM requires only setting DD_APPSEC_ENABLED=true. The same tracing library handles both performance monitoring and security protection.

Code-level vulnerability detection

Datadog ASM identifies vulnerabilities in your code based on how requests are processed at runtime. When the tracer observes dangerous patterns — unsanitized user input reaching database queries, for example — it flags the specific code location.

This approach catches vulnerabilities that static analysis misses because it observes actual execution paths rather than theorizing about code flow.

Getting started

1
Install the tracer — Add the Datadog tracing library for your language (Java, Node.js, Python, Go, Ruby, PHP, or .NET). If you already use Datadog APM, the tracer is already installed.
2
Enable ASM — Set DD_APPSEC_ENABLED=true as an environment variable or system property. For Java, pass -Ddd.appsec.enabled=true to the JVM.
3
Deploy — Restart your application. ASM starts detecting and blocking attacks using the same tracing library that collects APM data.
4
Review findings — Security events appear in the Datadog Security dashboard with linked distributed traces, user attribution, and code-level context.

Installation examples

Java

# Download the Datadog Java agent
curl -L https://dtdg.co/latest-java-tracer -o dd-java-agent.jar

# Run your application with ASM enabled
java -javaagent:dd-java-agent.jar \
  -Ddd.appsec.enabled=true \
  -Ddd.service=my-service \
  -Ddd.env=production \
  -jar your-application.jar

For application servers like Tomcat, add to CATALINA_OPTS:

export CATALINA_OPTS="$CATALINA_OPTS -javaagent:/opt/datadog/dd-java-agent.jar -Ddd.appsec.enabled=true"

Node.js Installation

npm install dd-trace

Initialize the tracer with ASM enabled:

// Must be the first line of your application
const tracer = require('dd-trace').init({
  appsec: { enabled: true },
  service: 'my-service',
  env: 'production'
});

// Your application code follows
const express = require('express');
const app = express();

Python Installation

pip install ddtrace

Run your application with the Datadog tracer:

DD_APPSEC_ENABLED=true DD_SERVICE=my-service ddtrace-run python app.py

For Django or Flask:

DD_APPSEC_ENABLED=true ddtrace-run gunicorn myapp.wsgi:application

Kubernetes Deployment

Use the Datadog Admission Controller to automatically inject the tracer:

apiVersion: apps/v1
kind: Deployment
metadata:
  name: my-app
  labels:
    admission.datadoghq.com/enabled: "true"
  annotations:
    admission.datadoghq.com/java-lib.version: latest
spec:
  template:
    metadata:
      labels:
        admission.datadoghq.com/enabled: "true"
      annotations:
        admission.datadoghq.com/java-lib.version: latest
    spec:
      containers:
        - name: my-app
          env:
            - name: DD_APPSEC_ENABLED
              value: "true"
            - name: DD_SERVICE
              value: my-service

Integrations

Datadog Platform
APM APM
Infrastructure Infrastructure
Log Management Log Management
SIEM SIEM

When to use Datadog ASM

Datadog ASM makes sense if you already use Datadog for APM. The same tracing library handles both — no additional agent to deploy or manage. Security events link directly to traces, logs, and infrastructure data, which cuts incident investigation time.

The in-app WAF works well in microservices architectures where network WAFs struggle to see past load balancers and service meshes. For teams that want standalone RASP without the Datadog platform, Contrast Protect or Dynatrace Application Security are alternatives.

Best for
Teams already using Datadog APM who want integrated runtime protection and API security without deploying a separate security agent.

Note: Now branded as Datadog App and API Protection

Frequently Asked Questions

What is Datadog Application Security Management?
Datadog ASM provides runtime application protection integrated with Datadog’s observability platform, combining RASP capabilities with distributed tracing and APM data.
Is Datadog ASM free or commercial?
Datadog ASM is a commercial product available as part of the Datadog platform subscription.
How does Datadog ASM protect applications at runtime?
It embeds an in-app WAF using the same tracing libraries as Datadog APM, blocking attacks like SQL injection, XSS, and SSRF from inside the application runtime.
Does Datadog ASM block attacks automatically?
Yes. Datadog ASM detects and blocks OWASP Top 10 attacks in real-time. Custom rules can also be created for application-specific threats.
Does Datadog ASM require a separate agent?
No. It uses the same tracing libraries as Datadog APM, so if APM is already installed, enabling ASM typically requires only configuration changes.