
Datadog announced expanded security and observability support for AWS serverless applications built on AWS Lambda and Step Functions services.
The functionality helps AWS Lambda and Step Functions users detect security threats, get a high-level overview of how their state machine is performing at a single point in time and monitor services instrumented with OpenTelemetry.
Serverless applications eliminate the need to provision and manage infrastructure components, including servers, databases, queues and containers, so teams can focus on writing code while minimizing their operational overhead. These applications also come with unique challenges as they need to be monitored and secured in different ways than traditional applications. Datadog already provides out-of-the-box observability for AWS serverless applications and today expanded these capabilities to include:
- Support for W3C Trace Context Propagation Across All Lambda Runtimes: Teams can now view complete distributed traces across upstream and downstream services that have been instrumented by various OpenTelemetry-compatible instrumentation libraries. This provides teams with improved visibility into their serverless applications so they can efficiently troubleshoot any issues.
- AWS Lambda OpenTelemetry API Compatibility Custom Instrumentation: Developers can now use vendor-neutral code instrumentation to submit custom OpenTelemetry spans from Lambda applications to Datadog in Node.JS and Python runtimes, allowing them to adhere to open source standards.
- Threat Detection for Serverless Applications Deployed on AWS Lambda Functions: The new support enables both DevOps and security engineers to detect and protect against attacks targeting their applications running on AWS Lambda functions.
- Open Source Vulnerability Detection for AWS Lambda Functions: Available in public beta, this capability provides engineers with real-time, continuous vulnerability detection in third-party libraries that are being run in their AWS Lambda applications.
- AWS Step Function Execution Visualization on State Machine Maps: To make troubleshooting issues within AWS Step Functions easier, developers can see the exact path of a Step Function execution, drill into anomalous executions and identify problematic states with ease.
"Datadog helps us detect attacks against our serverless applications and triggers an automated response to block those attempts as they happen," said Micha Katz, CISO at Yellow Card. "Application Security Management was simple to enable and further configure to meet our needs. It provides an informative, well-organized UI, where we can drill into attack details, trigger additional actions using predefined workflows, and gain important insights that help us calibrate and optimize our detection rules. Additionally, with vulnerability detection and contextualized severity ratings, we can better prioritize our remediation efforts within our service layers."
"Securing serverless applications can be a unique challenge because they are highly distributed and comprise several ephemeral, stateless components," said Vikram Varakantam, Senior Director of Product Management at Datadog. "By providing full visibility into serverless applications on AWS Lambda, Datadog Application Security Management's threat detection capability helps DevOps and security teams understand and prioritize the risks and attacks associated with their serverless applications so that they can work to resolve and mitigate any potential breach."
The new features are available now.
The Latest
According to Auvik's 2025 IT Trends Report, 60% of IT professionals feel at least moderately burned out on the job, with 43% stating that their workload is contributing to work stress. At the same time, many IT professionals are naming AI and machine learning as key areas they'd most like to upskill ...
Businesses that face downtime or outages risk financial and reputational damage, as well as reducing partner, shareholder, and customer trust. One of the major challenges that enterprises face is implementing a robust business continuity plan. What's the solution? The answer may lie in disaster recovery tactics such as truly immutable storage and regular disaster recovery testing ...
IT spending is expected to jump nearly 10% in 2025, and organizations are now facing pressure to manage costs without slowing down critical functions like observability. To meet the challenge, leaders are turning to smarter, more cost effective business strategies. Enter stage right: OpenTelemetry, the missing piece of the puzzle that is no longer just an option but rather a strategic advantage ...
Amidst the threat of cyberhacks and data breaches, companies install several security measures to keep their business safely afloat. These measures aim to protect businesses, employees, and crucial data. Yet, employees perceive them as burdensome. Frustrated with complex logins, slow access, and constant security checks, workers decide to completely bypass all security set-ups ...

In MEAN TIME TO INSIGHT Episode 13, Shamus McGillicuddy, VP of Research, Network Infrastructure and Operations, at EMA discusses hybrid multi-cloud networking strategy ...
In high-traffic environments, the sheer volume and unpredictable nature of network incidents can quickly overwhelm even the most skilled teams, hindering their ability to react swiftly and effectively, potentially impacting service availability and overall business performance. This is where closed-loop remediation comes into the picture: an IT management concept designed to address the escalating complexity of modern networks ...
In 2025, enterprise workflows are undergoing a seismic shift. Propelled by breakthroughs in generative AI (GenAI), large language models (LLMs), and natural language processing (NLP), a new paradigm is emerging — agentic AI. This technology is not just automating tasks; it's reimagining how organizations make decisions, engage customers, and operate at scale ...
In the early days of the cloud revolution, business leaders perceived cloud services as a means of sidelining IT organizations. IT was too slow, too expensive, or incapable of supporting new technologies. With a team of developers, line of business managers could deploy new applications and services in the cloud. IT has been fighting to retake control ever since. Today, IT is back in the driver's seat, according to new research by Enterprise Management Associates (EMA) ...
In today's fast-paced and increasingly complex network environments, Network Operations Centers (NOCs) are the backbone of ensuring continuous uptime, smooth service delivery, and rapid issue resolution. However, the challenges faced by NOC teams are only growing. In a recent study, 78% state network complexity has grown significantly over the last few years while 84% regularly learn about network issues from users. It is imperative we adopt a new approach to managing today's network experiences ...

From growing reliance on FinOps teams to the increasing attention on artificial intelligence (AI), and software licensing, the Flexera 2025 State of the Cloud Report digs into how organizations are improving cloud spend efficiency, while tackling the complexities of emerging technologies ...