Automated threat-alert triaging

  • Latest Dynatrace
  • Tutorial

Security teams face the challenge of sifting through massive amounts of security data to identify and respond to potential threats, prioritize alerts, and assess the severity of events. Lacking context in place, analysts spend valuable time sorting through the noise, switching between tools, and risking overlooking important information, which leads to delayed responses and inefficiencies in security operations.

The Dynatrace platform addresses this issue by providing security contextualization capabilities, such as threat intelligence enrichment. Various security findings in the Dynatrace platform contain observables, such as IP addresses. Those observables can now be enriched with reputation and other threat contexts, enabling you to

  • Classify and prioritize alerts
  • Reduce the noise
  • Respond to threat alerts fast

Target audience

This article is intended for incident response teams that want to automate the triage of new detections supported by threat intelligence.

Scenario

  • A new security detection finding from Amazon GuardDuty is ingested into the Dynatrace platform.

  • The security team wants to be notified in Slack only about new critical detections from an actor whose IP address is classified as malicious by the AbuseIPDB threat intelligence source.

The same scenario can be applied to other supported integrations for enrichment and security data ingest.

Prerequisites

Get started

Import the sample workflow available as a template in the AbuseIPDB app.

  1. In Dynatrace, open Settings > AbuseIPDB.
  2. In Templates, select and import the sample workflow.

To run the enrichment workflow action, you need to enable the security-intelligence:enrichments:run permission.

  1. Go to the settings menu in the upper-right corner of Workflows and select Authorization settings.
  2. In Secondary permissions, search for and select the security-intelligence:enrichments:run permission.
  3. Select Save.

Customize the DQL query action or the Slack notification message to your needs.

customize workflow

Run the workflow to test it.

Example notification:

test workflow

Schedule and save the workflow to be triggered automatically.

Related tags
Threat Observability