Skip to content

Conversation

@danieldebeer-dd
Copy link
Contributor

@danieldebeer-dd danieldebeer-dd commented Nov 28, 2025

What does this PR do? What is the motivation?

We need a document describing the findings v2 schema migration. See here.

@danieldebeer-dd danieldebeer-dd requested a review from a team as a code owner November 28, 2025 16:30
@github-actions github-actions bot added Images Images are added/removed with this PR Guide Content impacting a guide labels Nov 28, 2025
@github-actions
Copy link
Contributor

Preview links (active after the build_preview check completes)

New or renamed files

@danieldebeer-dd danieldebeer-dd changed the title Add Migrating to the New Security Findings Data Model Add Migrating to the New Security Findings Data Model Guide Nov 28, 2025
Copy link
Contributor

@janine-c janine-c left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Hey Daniel, thank you for putting together this PR and being willing to be the point of contact on your team! I made some general content suggestions, but know that this is going to be subject to change as the plan firms up. Let me know how I can help as it does! For now, I'll apply the WIP label on this while we wait for links and dates to go in the placeholders.

@@ -0,0 +1,117 @@
---
title: Migrating to the New Security Findings Data Model
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
title: Migrating to the New Security Findings Data Model
title: Migrate to the New Security Findings Data Model

Small style thing! We tend to go for imperative verbs instead of gerunds 🤓 Just for brevity and a little extra directness.


## Overview

The way Security Findings are queried is changing and it may impact your workflows. You notice changes to how queries are constructed in Datadog. A set of [new features](#new-features) exposing that new schema is also released as a part of the upgrade.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
The way Security Findings are queried is changing and it may impact your workflows. You notice changes to how queries are constructed in Datadog. A set of [new features](#new-features) exposing that new schema is also released as a part of the upgrade.
The syntax for creating queries to search for Security Findings in Datadog is changing. While this change comes with a set of [new features](#new-features) exposing that new schema, it may also impact your existing workflows.
This change affects all interfaces where you can query security findings data:
- Explorers, dashboards, notification rules, and automation pipelines
- Workflow Automation
- API and Terraform resources


## Required action

If you are using {insert relevant APIs / Terraform resource}, plan to migrate to the new version by {deprecation date}.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
If you are using {insert relevant APIs / Terraform resource}, plan to migrate to the new version by {deprecation date}.
If you are using {insert relevant APIs / Terraform resource}, plan to migrate to the new version by {deprecation date} so you can avoid interruptions in your existing workflows.


If you are using {insert relevant APIs / Terraform resource}, plan to migrate to the new version by {deprecation date}.

Configuration in Datadog is updated automatically, so no action is needed there.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Can we provide some detail on what "configuration in Datadog" means? How could a user determine what they need to change and what they can leave to us?

Comment on lines +27 to +29
## What are Security Findings

Security Findings encompass vulnerabilities, misconfigurations, and security risks identified across your infrastructure and applications.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
## What are Security Findings
Security Findings encompass vulnerabilities, misconfigurations, and security risks identified across your infrastructure and applications.
## Security findings
Security findings encompass vulnerabilities, misconfigurations, and security risks identified across your infrastructure and applications.


- A new unified findings public API
- Dashboard support for Code Security
- Graphing Security Findings in Datadog Sheets
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
- Graphing Security Findings in Datadog Sheets
- Graphing security findings in Datadog Sheets

- Dashboard support for Code Security
- Graphing Security Findings in Datadog Sheets
- Datadog Workflow Automation support for all finding types
- Using SQL to query Security Findings and join them with other Datadog Telemetry via DDSQL
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
- Using SQL to query Security Findings and join them with other Datadog Telemetry via DDSQL
- Using SQL to query security findings and join them with other Datadog telemetry using DDSQL

Comment on lines +110 to +113
## How to prepare

- Every in-app feature will be automatically migrated.
- Legacy API endpoints and Terraform resources will eventually be deprecated.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The heading and the content here don't really seem to match, because the heading would make me expect instructions about how to prepare, but then the bullets aren't action items. Can we rename the section or work the bullet points into the rest of the content on the page?

Comment on lines +54 to +58
| Before | After |
|--------|-------|
| **Misconfigurations:** `@workflow.triage.status:open status:critical`<br>**Library vulnerabilities:** `status:open severity:Critical` | **All findings:** `@status:open @severity:critical` |
| **Misconfigurations:** `@dd_computed_attributes.is_publicly_accessible:true`<br>**Host Vulnerabilities:** `is_publicly_accessible:Accessible` | **All findings:** `@risk.is_publicly_accessible:true` |
| **Library Vulnerabilities:** `library_name:org.apache.logging.log4j`<br>**Host Vulnerabilities:** `package:org.apache.logging.log4j` | **All findings:** `@package.name:org.apache.logging.log4j` |
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
| Before | After |
|--------|-------|
| **Misconfigurations:** `@workflow.triage.status:open status:critical`<br>**Library vulnerabilities:** `status:open severity:Critical` | **All findings:** `@status:open @severity:critical` |
| **Misconfigurations:** `@dd_computed_attributes.is_publicly_accessible:true`<br>**Host Vulnerabilities:** `is_publicly_accessible:Accessible` | **All findings:** `@risk.is_publicly_accessible:true` |
| **Library Vulnerabilities:** `library_name:org.apache.logging.log4j`<br>**Host Vulnerabilities:** `package:org.apache.logging.log4j` | **All findings:** `@package.name:org.apache.logging.log4j` |
| Before | After (all findings) |
|--------|----------------------|
| **Misconfigurations:** `@workflow.triage.status:open status:critical`<br>**Library vulnerabilities:** `status:open severity:Critical` | `@status:open @severity:critical` |
| **Misconfigurations:** `@dd_computed_attributes.is_publicly_accessible:true`<br>**Host Vulnerabilities:** `is_publicly_accessible:Accessible` | `@risk.is_publicly_accessible:true` |
| **Library Vulnerabilities:** `library_name:org.apache.logging.log4j`<br>**Host Vulnerabilities:** `package:org.apache.logging.log4j` | `@package.name:org.apache.logging.log4j` |

Thought we could put "all findings" into the column header so we didn't have to repeat it 🙂

Comment on lines +90 to +108
### Milestone 1: January 2026

**Migrated Findings** (use new schema):
- Misconfigurations
- Identity Risks
- Attack Paths
- IaC & API Security Findings

**Platform Updates:**
- Dashboards
- DDSQL
- Sheets
- Findings Public API

### Milestone 2: April 2026

**Remaining Findings** (use new schema):
- Cloud Security Vulnerabilities
- Code Security Findings (SCA, SAST, IAST, Secrets)
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think I would rather keep this out of the external docs so we can keep some wiggle room in case we wind up diverging from this timeline. Above, we already do a good job of describing what changes are coming, and I think that's sufficient.

@janine-c janine-c added the WORK IN PROGRESS No review needed, it's a wip ;) label Nov 29, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

Guide Content impacting a guide Images Images are added/removed with this PR WORK IN PROGRESS No review needed, it's a wip ;)

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants