Latest Dynatrace Preview
In the following, you'll learn how to ingest security findings from AWS Security Hub into Grail and analyze them on the Dynatrace platform.
Security finding events from AWS Security Hub are ingested into Dynatrace via a dedicated OpenPipeline security ingest endpoint, using an Amazon EventBridge event forwarding set up with an AWS CloudFormation template.
The OpenPipeline ingest endpoint processes and maps the security findings according to the Semantic Dictionary conventions.
These are stored in a bucket called default_security_custom_events
(for details, see: Built-in Grail buckets).
See below for the AWS Security Hub and Dynatrace requirements.
Install and configure the latest AWS CLI.
Select the AWS region where you want to create the AWS Security Hub event forwarder.
In a terminal, run:
aws configure
Set your default region (for example, us-east-1
).
openpipeline.events_security
scope and save it for later.To set up AWS Security Hub ingestion, follow the steps below.
Download the Dynatrace CloudFormation template from GitHub.
Set up the secret with the OpenPipeline API token.
Run the following command, making sure to replace <your_Api_Token>
with your actual access token created in Prerequisites.
optional You can customize the AwsSecretKeyName
variable. If not set, it defaults to DYNATRACE_OPENPIPELINE_INGEST_API_TOKEN
.
aws secretsmanager create-secret \--name dynatrace-aws-security-hub-event-forwarder-open-pipeline-ingest-api-token \--description "Dynatrace Token, which allows data to be sent to the OpenPipeline endpoint." \--secret-string '{"DYNATRACE_OPENPIPELINE_INGEST_API_TOKEN": "<Token>"}'
Deploy the CloudFormation template and AWS resources.
Run the following command, making sure to replace
AwsSecretArn
variable with the ARN of the secret created previouslyDynatraceDomain
variable with your actual domain nameoptional You can customize the DynatraceOpenPipelineEndpointPath
variable. If not set, it defaults to /platform/ingest/v1/events.security
.
aws cloudformation deploy \--template-file ./dynatrace_aws_security_hub_event_forwarder_template.yaml \--stack-name dynatrace-aws-security-hub-event-forwarder \--parameter-overrides \"AwsSecretArn"="arn:aws:secretsmanager:us-east-1:12345678:secret:dynatrace-aws-security-hub-event-forwarder-open-pipeline-ingest-api-token-testxyz" \"DynatraceDomain"="{your-environment-id}.live.dynatrace.com" \--capabilities CAPABILITY_NAMED_IAM
Once you ingest your Amazon Security Hub data into Grail, you can create your own dashboards or use our sample dashboard to visualize and analyze findings.
For instructions, see Visualize and analyze findings.
You can create your own workflows or use our sample workflows to automate and orchestrate findings.
For instructions, see Automate and orchestrate findings.
You can query ingested data in Notebooks or Security Investigator using the data format in Semantic Dictionary.
To stop sending events to Dynatrace, run the following command, which removes the Dynatrace resources created for this integration.
aws cloudformation delete-stack --stack-name dynatrace-aws-security-hub-event-forwarder
For billing information, see Events powered by Grail.