Dynatrace Application Security - Code-Level runtime vulnerability detection
| Id | 305093b4-0fa2-57bc-bced-caea782a6e9c |
| Rulename | Dynatrace Application Security - Code-Level runtime vulnerability detection |
| Description | Detect Code-level runtime vulnerabilities in your environment |
| Severity | Medium |
| Tactics | DefenseEvasion Execution Impact InitialAccess LateralMovement Persistence PrivilegeEscalation |
| Required data connectors | DynatraceRuntimeVulnerabilities |
| Kind | Scheduled |
| Query frequency | 1d |
| Query period | 1d |
| Trigger threshold | 0 |
| Trigger operator | gt |
| Source Uri | https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Dynatrace/Analytic Rules/DynatraceApplicationSecurity_CodeLevelVulnerabilityDetection.yaml |
| Version | 1.0.3 |
| Arm template | 305093b4-0fa2-57bc-bced-caea782a6e9c.json |
DynatraceSecurityProblems
| where VulnerabilityType == "CODE_LEVEL" and DAVISRiskLevel == "CRITICAL" and Muted == false
| summarize arg_max(LastUpdatedTimeStamp, *) by SecurityProblemId
status: Available
eventGroupingSettings:
aggregationKind: AlertPerResult
kind: Scheduled
customDetails:
DAVISRiskScore: DAVISRiskScore
CVEIds: CVEIds
SecProbIdentifier: SecurityProblemId
DisplayIdentifier: DisplayId
Technology: Technology
DAVISVulnFuncUsage: DAVISVulnerableFunctionUsage
PackageName: PackageName
DAVISExposure: DAVISExposure
DAVISDataAssets: DAVISDataAssets
VulnerabilityType: VulnerabilityType
DAVISRiskVector: DAVISRiskVector
SecurityProblemUrl: Url
DAVISPublicExploit: DAVISPublicExploit
ExternVulnIdentifier: ExternalVulnerabilityId
DAVISRiskLevel: DAVISRiskLevel
name: Dynatrace Application Security - Code-Level runtime vulnerability detection
queryFrequency: 1d
OriginalUri: https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Dynatrace/Analytic Rules/DynatraceApplicationSecurity_CodeLevelVulnerabilityDetection.yaml
requiredTechniques:
- T1140
- T1059
- T1565
- T1659
- T1210
- T1554
- T1548
severity: Medium
id: 305093b4-0fa2-57bc-bced-caea782a6e9c
incidentConfiguration:
createIncident: false
groupingConfiguration:
matchingMethod: AllEntities
reopenClosedIncident: false
enabled: false
lookbackDuration: PT5H
entityMappings:
- entityType: URL
fieldMappings:
- columnName: Url
identifier: Url
tactics:
- DefenseEvasion
- Execution
- Impact
- InitialAccess
- LateralMovement
- Persistence
- PrivilegeEscalation
queryPeriod: 1d
version: 1.0.3
requiredDataConnectors:
- connectorId: DynatraceRuntimeVulnerabilities
dataTypes:
- DynatraceSecurityProblems
triggerThreshold: 0
triggerOperator: gt
alertDetailsOverride:
alertSeverityColumnName: Severity
alertDisplayNameFormat: 'Dynatrace Code-Level runtime vulnerability detected - {{DisplayId}} : {{Title}}'
alertDescriptionFormat: |
Code-Level runtime vulnerability ({{ExternalVulnerabilityId}}) detected in package ({{PackageName}}), more details available from Dynatrace at {{Url}}.
query: |
DynatraceSecurityProblems
| where VulnerabilityType == "CODE_LEVEL" and DAVISRiskLevel == "CRITICAL" and Muted == false
| summarize arg_max(LastUpdatedTimeStamp, *) by SecurityProblemId
description: Detect Code-level runtime vulnerabilities in your environment