Security teams face the challenge of sifting through massive amounts of security data to identify and respond to potential threats, prioritize alerts, and assess the severity of events. Lacking context in place, analysts spend valuable time sorting through the noise, switching between tools, and risking overlooking important information, which leads to delayed responses and inefficiencies in security operations.
The Dynatrace platform addresses this issue by providing security contextualization capabilities, such as threat intelligence enrichment. Various security findings in the Dynatrace platform contain observables, such as IP addresses. Those observables can now be enriched with reputation and other threat contexts, enabling you to
This article is intended for incident response teams that want to automate the triage of new detections supported by threat intelligence.
A new security detection finding from Amazon GuardDuty is ingested into the Dynatrace platform.
The security team wants to be notified in Slack only about new critical detections from an actor whose IP address is classified as malicious by the AbuseIPDB threat intelligence source.
The same scenario can be applied to other supported integrations for enrichment and security data ingest.
security-intelligence:enrichments:run
permission to run enrichments.Import the sample workflow available as a template in the AbuseIPDB app.
To run the enrichment workflow action, you need to enable the security-intelligence:enrichments:run
permission.
security-intelligence:enrichments:run
permission.Customize the DQL query action or the Slack notification message to your needs.
Run the workflow to test it.
Example notification:
Schedule and save the workflow to be triggered automatically.