Dynatrace applies secure development controls in its Security Development Lifecycle (SDL).
The Extensions 2.0 framework is secure, but the security of your extensions also depends on how you develop them and manage them in your Dynatrace environment.
Follow these good practices to make your extensions as secure as possible.
The Extensions 2.0 framework uses an extension signing mechanism to ensure the integrity of extensions distributed in your environment. By uploading the root certificate to the host running extension, you verify your write access to the host. However, it's also your responsibility to keep certificates secure.
Group your extensions into categories and use different signing certificates for different extension types. For example:
If your certificates leak
Code added to your extension YAML file (for example, SQL queries) carries a risk of system compromise if an attacker gains access to the Dynatrace environment. The following good practices can help you keep the extension code secure.
Dynatrace Extensions 2.0 data sources are secure, but it's your responsibility to make sure the code you add to the extension YAML file is also secure.
You're responsible for the integrity and authenticity of the unsigned extension code you receive or download from the internet. When you sign code received from a third party, review the code for potentially malicious behavior or vulnerabilities.
Create dedicated users for your extensions (for example, database users) and give them limited permissions. An extension user should be able to access only the data required for your extension. Avoid using admin or super-privileged users to access data sources for your extensions.
Users with write access might be able to obtain a secret that is present in the extension configuration, even if it is masked in the web UI or REST API, by modifying certain parts of the monitoring configuration.
To secure secrets from unauthorized access, implement least privilege access control policies for extension configurations:
For more information, see Access control.
Some data sources make the extension perform actions that may be considered sensitive (for example, executing SQL queries). This may expose sensitive data from a monitored system. Review your extension to make sure it doesn't retrieve any sensitive information.