Runtime Vulnerability Analytics

  • Latest Dynatrace
  • How-to guide
  • Published Oct 13, 2022

Dynatrace Runtime Vulnerability Analytics enables you to detect, visualize, analyze, monitor, and remediate open-source and third-party vulnerabilities, as well as the security vulnerabilities in libraries and first-party code in production and pre-production environments at runtime.

Capabilities

  • Automatic and continuous protection powered by Davis, the Dynatrace AI causation engine. Davis continuously watches production and pre-production environments to identify any changes in application environments (such as container dynamics, elastic scaling, multi-version deployments, runtime container updates, rollbacks, A/B tests, or blue/green deployments) and provide precise answers about the source, nature, and severity of vulnerabilities as they arise in real time. Davis automatically analyzes and prioritizes alerts.
  • Continuous analysis of attack vectors to automatically track if vulnerable libraries are called and used at runtime. Dynatrace Application Security is designed to allow you to identify the most relevant vulnerabilities and reduce false positives with Smartscape real-time topology mapping and distributed tracing with PurePath® code-level analysis.
  • Runtime introspection approach in combination with Snyk and NVD, for automatic vulnerability detection at runtime. Even if security checks aren't integrated into the pipelines across all teams, or if they're deliberately bypassed, Dynatrace can detect what’s running and pinpoint vulnerabilities instantly by automatically opening a vulnerability when one is detected, and close it when the root cause (for example, loading a vulnerable library) is no longer present.
  • Full coverage across production rollbacks and outdated releases, feature flags, and deployment patterns (canary, blue/green).
  • Efficient management of vulnerabilities where a fix hasn't been effective, such as if a vulnerability is accidentally reintroduced during a rollback, or if updates haven't been applied correctly.
  • Precise and automatic risk and impact assessment, with risks prioritized by data access path and actual production execution. From hundreds or thousands of open vulnerabilities, Dynatrace Application Security is designed to pinpoint those that need immediate investigation. It automatically analyzes data access paths and production execution to provide a more precise risk and impact assessment.

Prerequisites

Supported technologies

Dynatrace detects third-party vulnerabilities in the following technologies.

Technology
Minimum OneAgent version
Go1
1.245
Java2
1.221
Java runtimes
1.253
Kubernetes
1.219
.NET1
1.233
.NET runtimes
1.255
Node.js3
1.231
Node.js runtimes
1.253
PHP
1.231
Python1'4
1.309
Python runtimes
1.309
1

For .NET, Go, and Python technologies, for which automatic deep monitoring is disabled, you need to manually enable deep monitoring on each host. For more information, see Process deep monitoring.

2

Java on z/OS is currently not supported.

3

Using Webpack or other bundlers might have an impact on automatic vulnerability detection. This is because the software components cannot be detected, as they are hidden behind the bundler configuration and not available at runtime. Only packages that are deployed as external packages can be detected and reported. For details, see Node.js: Limitations.

4

For Python vulnerabilities, Dynatrace currently supports only two states for reachable data assets: Within range and Not available.

Get started

  • Third-party vulnerability detection helps you identify open-source and third-party vulnerabilities in production and pre-production environments at runtime.

  • Code-level vulnerability detection leverages code inspection at runtime to identify security vulnerabilities in libraries and first-party code.

OneAgent version 1.239+

  1. Go to Settings and select Application Security > Vulnerability Analytics > General settings.
  2. Under Third-party Vulnerability Analytics, select Enable Third-party Vulnerability Analytics.

To define the default third-party vulnerability detection control for all processes and Kubernetes nodes

  1. Go to Settings and select Application Security > Vulnerability Analytics > General settings.
  2. Under Third-party vulnerability Analytics, select one of the Global third-party vulnerability detection control modes:
    • Monitor—Third-party vulnerabilities are reported.
    • Do not monitor—Third-party vulnerabilities are ignored.

You can also define custom monitoring rules based on certain criteria. In this case, the default monitoring mode applies to all processes and Kubernetes nodes that are not matched by a rule.

optional

After you enable Third-party Vulnerability Analytics, Dynatrace starts generating vulnerabilities for all supported technologies by default. To control which of these technologies should receive vulnerabilities

  1. Go to Settings and select Application Security > Vulnerability Analytics > General settings.

  2. Under Third-party Vulnerability Analytics, enable or disable technologies as needed.

    Runtime technologies (for example, Java, Node.js, and .NET runtimes) are tied to the corresponding main technology (for example, Java and Node.js). If the main technology is disabled, the corresponding runtime technology is automatically disabled. If you enable the main technology, enabling the corresponding runtime technology is optional.

  3. Select Save changes.

This step is required only to monitor vulnerabilities in Python technology.

  1. Enable Dynatrace monitoring for Python: In Monitoring > Monitoring technologies, find Python and enable Monitor Python.
  2. Enable OneAgent monitoring: In Preferences > OneAgent features, find and enable Python software component reporting, then restart your processes.

optional

To enable OneAgent monitoring for Java vulnerable functions

  1. Go to Settings and select Preferences > OneAgent features.
  2. Find and enable Java vulnerable function reporting.
  3. Select Save changes.
  4. Restart your processes.

For more information about function usage, see Vulnerable functions.

What's next

After you enable third-party vulnerability detection, you can

For details on how Dynatrace evaluates third-party and code-level vulnerabilities, see Vulnerability evaluation.

Try out our Vulnerabilities app to improve your environment's security by quickly addressing vulnerabilities and remediation actions.

Consumption

Runtime Vulnerability Analytics is licensed based on the consumption of GiB-hours if you're using the Dynatrace Platform Subscription (DPS) licensing model, or Application Security units (ASUs) if you're using the Dynatrace classic licensing.

Related tags
Application Security