Security problem management

Dynatrace Application Security enables you to detect, visualize, analyze, monitor, and remediate open-source and third-party vulnerabilities in production and pre-production environments at runtime.
The general process is described below.

Software and runtime components

To detect vulnerabilities in your environment, Application Security evaluates software components (libraries) and runtime components (for example, Kubernetes packages).

  • Libraries are reported by OneAgent when a process is loading them. Therefore, only libraries that are in use will be checked for vulnerabilities. Library information is checked and updated periodically.

  • Kubernetes packages are runtime components used by the Kubernetes cluster. They are reported by OneAgent once the component is in use on a node.
    Examples of Kubernetes packages that Dynatrace tracks and scans for vulnerabilities:

    • On the control plane node:
      • kube-apiserver
      • etcd
      • kube-scheduler
      • kube-controller-manager
      • cloud-controller-manager
    • On the worker node:
      • kubelet
      • kubeproxy

Topology changes

Once Dynatrace finds a new vulnerability, it regularly checks for topology changes (for example, when a new sensitive asset or data source is involved).

Vulnerability feeds

The vulnerability feeds are checked for updates every five minutes. If there's a new feed available, the information is pushed to the Dynatrace Cluster via Cloud Control/Mission Control. Updated vulnerability feeds are imported into Dynatrace Clusters within approximately two hours.

Based on the existent vulnerability feeds, Dynatrace searches for new vulnerabilities in your environment every minute.

Risk assessment

To determine external exposure and affected data assets, Dynatrace takes the following into consideration:

  • Sources - a known exploit is determined by the feed reporting the vulnerability.
  • Entities - a vulnerable software component is linked to the process group instance of the reporting component, and the running services in that process group are used to calculate the exposure and whether sensitive data assets are affected.
  • Dependencies - to calculate exposure, Dynatrace analyzes whether incoming web request services and web service calls from the last day come from a public IP address. To see if sensitive data assets are affected, Dynatrace investigates related services and services that are directly called by those services. If one of those services is a database, a sensitive data asset is affected.