Security Flashcards

1
Q

Prereq for AppSec

A

Supported version of Dynatrace
Deep monitoring enabled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

3 Modules of AppSec

A

RVA Runtime Vulnerability Analytics
RAP Runtime Application Protection
SPM Security Posture Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

2 submodules of RVA

A

Code-level vulnerability detection
Third-party vulnerability detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Dependency between RAP and RVA

A

If RAP is enabled, RVA is also automatically enabled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How is consumption tracked for RVA and RAP if you use DPS?

A

GiB-hour cosumned by hosts with the feature enabled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How is consumption tracked for classic licensing model?

A

Application Security Units

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How are ASUs defined?

A

RAM in GB / 16 x number of activated features (RVA/RAP) x 24 x 365

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Why does RAP need RVA?

A

Because RAP uses RVA to analyse the vulnerability that the attack is based on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

3 locations to check consumption for RVA and RAP if you use DPS?

A

Account management
Data explorer
Environment API

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How is KSPM licensed?

A

Host hours

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

2 types of SPM?

A

VSPM
CSPM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How is VSPM licensed?

A

CPU sockets per year

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How is CSPM licensed?

A

host per year

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A host in the CSPM context applies to what kind of resources?

A

compute, database, and function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are users of the Security admin group allowed to do?

A

View and manage vulnerabilities if RVA is enabled and attacks if RAP is enabled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How can i fine tune permissions for users?

A

Assign view rights per environment or management zone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which modules are affected if full stack monitoring is not used and why?

A

Code vulnerability and third party vulnerability because not sufficient environmental information, such as reachable data assets or public internet exposure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

To detect third-party vulnerabilities in your environment what components are evaluated?

A

Software components
Runtime components

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What attributes of the component or library are checked by application security?

A

Name and version

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What providers are used for Third-party vulnerabilitie feed and how often are they checked?

A

Snyk and NVD (National Vulnerability Database)
Once every 5 min

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

For what kind of components is Snyk used for?

A

Software components (libraries)
Kube runtime components

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

For what kind of components is NVD used for?

A

Java runtime components
.NET runtime components
Node.JS runtime components

23
Q

What is the resolution time for a Third-party vulnerabilitie?

24
Q

What could cause the resoultion of a Third-party vulnerabilitie? (5)

A

Affected process was stopped
Vulnerable component was updated or removed
App is not using the vulnerable component
After a restart there is no traffic to the app so the component doesnt load
Vulnerability has been fixed in the code

25
Q

What is the severity of a code level vulnerability?

26
Q

Resolution reasons for code level vulnerabilities? (4)

A

Has been fixed in the code
Has been fixed outside the app
Affected process doesnt receive any traffic
Affected process was stopped

27
Q

How can you enable RVA on a more granular level?

A

enable/disable per supported technology

28
Q

Overriding monitoring rules for third party vulnerabilities can be defined for which entity properties?

A

Host tag
Process tag
Management zone

29
Q

From where and how can you enable RVA?

A

Enable RVA Application Security > Vulnerability Analytics > General settings.
Enable technology
Enable OneAgent feature flag code-level vulnerability evaluation

30
Q

What does the name of a vulnerability contain?

A

Dynatace ID
Then depends on feed:
Snyk: Snyk ID
CVE:vulnerability id
CWE: vulnerability name

31
Q

What are the 4 Risk assessment properties of a vulnerability?

A

Public internet exposure
Reachable data assets
Vulnerable function in use
Public exploit published

32
Q

4 statuses of a vulnerability

A

Open
Resolved
Muted Open
Muted Resolved

33
Q

7 reasons for a status change of a vulnerability

A

Opend or resolved
Muted or unmuted
The number of affected process groups has decreased or increased
The risk assessment has changed
The Davis Security Score has changed
The CVSS has changed
A new software component is detected

34
Q

What are the 4 metrics based on which the DSS is calculated?

A

CVSS Score
Attack vector
Confidentiality
Integrity

35
Q

Why is DSS more precise than CVSS?

A

CVSS assumes worst case scenario while DSS analyses the context as well based on public internet exposure and reachable data assets

36
Q

6 types of entities that can be related to a vulnerability

A

App
Service
Database
Host
Kube cluster
Kube workload

37
Q

What views is a MZ filter affecting on the vulnerability details page?

A

Related entities
Vulnerable components

38
Q

How many MZ can be associated with a vulnerability at max?

39
Q

What are the 4 attributes of a recommendation from the security advisor?

A

Library that needs to be upgraded
Library tech logo
number of highest critical vulnerabilities solved
total vulnerabilities solved

40
Q

What happens to existing vulnerabilities if you define a “do not monitor” rule that targets them?

A

They get “Resolved”

41
Q

4 code vulnerabilities that Dynatrace detects and their context?

A

SQL Injection - SQL statement
Command injection - command
SSRF - request URL
Improper input validation - JNDI lookup name

42
Q

When is an attack path shown?

A

When RVA is activated
When there are fewer than 500 attacks on a vulnerability

43
Q

What does the attack path contain?

A

Source IP
Entry point
Vulnerability
Target

44
Q

What are the 3 notification integrations for vulnerabilities?

A

Webhook
Jira
Email

45
Q

When is a notification triggered?

A

Open resolved
New process group affected

46
Q

What are the 6 properties of attacks that can be used when you define an allow rule?

A

Attacker IP
Attack type
Entry point payload
Entry point domain
Entry point port
Entry point path

47
Q

What are the standards supported for SPM?

A

CIS
DORA
NIST
STIG

48
Q

What is the component used to capture compliance data for SPM?

A

Kube Node config collector

49
Q

How can i fix vulnerabilities in DT? (2)

A

Set up tracking links
Update version according to davis security advisor

50
Q

Are restarts required for 3rd party vulnerabilities? If so, when?

51
Q

Are restarts required for code level vulnerabilities? If so, when?

A

Yes.
Enable Global
Enable per tech
Enable OA feature
New monitoring rule

52
Q

Are restarts required for attacks? If so, when?

A

Yes.
Enable Global
Enable per tech
Enable OA feature
New monitoring rule

53
Q

How long are vulnerabilities stored?

A

365 days if resolved within a year
Next anniversary after resolution if resolved after a year

54
Q

How long are attacks stored?