Latest Dynatrace Preview
In the following, you'll learn how to ingest security findings from AWS Security Hub into Grail and analyze them on the Dynatrace platform.
Security finding events from AWS Security Hub are ingested into Dynatrace via a dedicated OpenPipeline security ingest endpoint, using an Amazon EventBridge event forwarding set up with an AWS CloudFormation template.
The OpenPipeline ingest endpoint processes and maps the security findings according to the Semantic Dictionary conventions.
These are stored in a bucket called default_security_custom_events
(for details, see: Built-in Grail buckets).
See below for the AWS Security Hub and Dynatrace requirements.
Install and configure the latest AWS CLI.
Select the AWS region where you want to create the AWS Security Hub event forwarder.
In a terminal, run:
aws configure
Set your default region (for example, us-east-1
).
openpipeline.events_security
scope and save it for later.You need an Admin user to define a custom policy with the app-engine:apps:install
permission to install the app. For details, see Dynatrace access.
Once you ingest your AWS Security Hub data into Grail, you can monitor your data in the app (in Dynatrace, open AWS Security Hub).
You can view
A chart of ingested data from all existing connections over time
A table with information about your connections
You can create your own dashboards or use our templates to visualize and analyze container vulnerability findings.
To use a dashboard template
You can create your own workflows or use our templates to automate and orchestrate container vulnerability findings.
To use a workflow template
You can query ingested data in Notebooks or Security Investigator
, using the data format in Semantic Dictionary.
To query ingested data
For AWS, Dynatrace supports the following security event types:
List of AWS events mapped to Dynatrace:
All other events are ingested, but not mapped.
By default, once you set up the Dynatrace integration, all AWS event types are ingested into Dynatrace.
To limit ingestion to a specific event type, you need to set up filters for your Dynatrace AWS Security Hub event forwarder Lambda function in EventBridge.
Example filters:
{"source": ["aws.securityhub"],"detail-type": ["Security Hub Findings - Imported"],"detail": {"findings": {"Types": ["Software and Configuration Checks/Vulnerabilities/CVE"]}}}
To stop sending events to Dynatrace
This removes the Dynatrace resources created for this integration.
This removes the Dynatrace resources created for this integration.
For billing information, see Events powered by Grail.