Dynatrace Security Posture Management (SPM) enables you to assess, manage, and take action on misconfigurations and violations against security hardening guidelines and regulatory compliance standards.
Security Posture Management provides comprehensive visibility into the security posture of your Kubernetes, cloud, and VMware environments. Depending on your infrastructure, the following flavors are available:
Dynatrace Kubernetes Security Posture Management (KSPM): Enables you to detect, analyze, and monitor misconfigurations, security hardening guidelines, and potential compliance violations across your Kubernetes deployments.
Runecast Cloud Security Posture Management (CSPM): Provides in‑depth insights into the security posture of your AWS, Azure, and GCP environments.
Runecast VMware Security Posture Management (VSPM): Provides in‑depth insights into the security posture of your VMware environments, including vCenter and NSX‑T.
Across these flavors, SPM delivers a consistent set of core capabilities:
Security Posture Management continuously evaluates your environment for misconfigurations, policy violations, and compliance risks. Dynatrace collects configuration data from your infrastructure and cloud platforms, streams it into Grail, and normalizes it into security events. These are then evaluated against hardening guidelines and compliance standards. Results update in real time as your environment changes, helping you stay secure and audit-ready.
For a quick walkthrough, see Dynatrace Cloud Security Posture Management elevates cloud security with real-time compliance across hyperscalers.
Security Posture Management supports a range of compliance standards through two types of coverage: Dynatrace native support and Runecast‑integrated support. Native standards are maintained directly by Dynatrace and kept up to date.
The table below shows which standards are supported and how each one is provided.
For detailed explanations of each compliance standard and how Dynatrace supports them, see Security Posture Management compliance standards.
| Compliance standards | Kubernetes1 | AWS | Azure | GCP | vSphere2 | NSX-T3 |
|---|---|---|---|---|---|---|
| BSI C5 | ||||||
| BSI IT-Grundschutz | ||||||
| CIS | ||||||
| Cyber Essentials | ||||||
| DISA STIG | ||||||
| DORA | ||||||
| Essential Eight | ||||||
| GDPR | ||||||
| HIPAA | ||||||
| ISO 27001 | ||||||
| KVKK | ||||||
| NIST | ||||||
| PCI DSS | ||||||
| TISAX | ||||||
| VMware SCG |
Support includes upstream Kubernetes, Amazon EKS, and Azure AKS. Compatibility is limited to x86-64 CPU architectures and requires Kubernetes version according to Dynatrace support lifecycle (unless defined otherwise in the specific standard).
Supported versions are VMware ESXi 8.0 v1.1.0, VMware ESXi 7.0 v1.4.0, VMware ESXi 6.7 v1.2.0, and VMware ESXi 6.5 v1.0.0.
NSX-T support is limited to version 3.2 and later.
Once you set up Kubernetes Security Posture Management, you can
Security Posture Management
Investigations or
Notebooks
Try
Security Posture Management and share your feedback to help us improve.
Once you set up CSPM/VSPM, you can
Visualize data with our Security Posture Overview dashboard. For details, see Next steps.
Query compliance events with
Investigations or
Notebooks.
Stay compliant with Security Posture Management
For an overview of how to use compliance findings, see Stay compliant with Security Posture Management.
For guidelines on how to increase compliance, see Stay compliant with Security Posture Management.
For instructions, see Improve coverage.
Resources on your system are assessed as Failed (not compliant) according to rules specified in the supported standards.
Maintaining your security posture is fundamental to your overall security strategy. Think of it as basic security hygiene—without it, all other security measures you implement will be significantly less effective. On the compliance side, not addressing these findings means you won't be able to identify, assess, and fix potential issues that could lead to audit failures.
Manually handling the numerous checks required for audits quickly becomes an overwhelming task, consuming countless hours. With our Security Posture Management solution, this entire process is automated, ensuring both security and compliance are effectively managed.
Ignoring compliance issues presents potential exposure risk or compliance failure risk.
For guidelines on how to fix findings, see Stay compliant with Security Posture Management.
For a list of supported systems and their versions and distributions, see Security Posture Management.
Running Security Posture Management on Kubernetes is entirely independent of OneAgent and thus independent of the Monitoring modes.
Analyzed data originates from the Kubernetes API Server and the Kubernetes Node Configuration Collector via ActiveGate.
Therefore, you can use
Security Posture Management with Kubernetes Platform Monitoring, where OneAgent isn't deployed.
Set up the Dynatrace integration with Runecast Analyzer.
Kubernetes security essentials: Container misconfigurations – From theory to exploitation
Revolutionizing cloud security with observability context: Dynatrace Cloud Security addressing CADR
Empowering SREs with runtime vulnerability analytics and security posture management
What is Kubernetes security posture management? Driving business security with KSPM
Which IT security solution is right for your organization? CSPM vs. KSPM vs. CNAPP
Dynatrace KSPM: Transforming Kubernetes security and compliance