This page has been updated to align with the new Grail security events table. For the complete list of updates and actions needed to accomplish the migration, follow the steps in the Grail security table migration guide.
In the following, you'll learn how to ingest vulnerability findings from any source or provider in a standard format (Open Cybersecurity Schema Framework (OCSF)) into Grail and analyze them on the Dynatrace platform.
Details | You feed the OCSF-formatted data into Grail via our built-in security events OpenPipeline endpoint. |
Action required | Follow the instructions in Get started. |
Details | The OpenPipe ingest endpoint receives the vulnerability findings and maps (formats) them according to the Semantic Dictionary. These are stored in a bucket called Ingested data is mapped to Dynatrace Semantic Dictionary. Original vendor data is also preserved alongside the mapped data. |
Action required | No action is required from your side. |
After data is ingested into Grail, you can visualize, analyze, and automate data.
storage:security.events:read
.Once you ingest your OCSF data into Grail, you can monitor your data in the app (in Dynatrace, go to Settings > OCSF).
You can view
A chart of ingested data from all existing connections over time
A table with information about your connections
You can create your own dashboards or use our templates to visualize and analyze container vulnerability findings.
To use a dashboard template
You can create your own workflows or use our templates to automate and orchestrate container vulnerability findings.
To use a workflow template
You can query ingested data in Notebooks or Security Investigator
, using the data format in Semantic Dictionary.
To query ingested data
For OCSF, Dynatrace supports vulnerability findings (regardless of the source) following the OCSF v1.1.0 format.
To stop sending events to Dynatrace
This removes the Dynatrace resources created for this integration.
For billing information, see Events powered by Grail.
With the ingested data, you can accomplish various use cases, such as