Security Flashcards

1
Q

Prereq for AppSec

A

Supported version of Dynatrace (1.239+)
Deep monitoring enabled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

3 Modules of AppSec

A

RVA Runtime Vulnerability Analytics
RAP Runtime Application Protection
SPM Security Posture Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

2 submodules of RVA

A

Code-level vulnerability detection
Third-party vulnerability detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Dependency between RAP and RVA

A

If RAP is enabled, RVA is also automatically enabled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How is consumption tracked for RVA and RAP if you use DPS?

A

GiB-hour cosumned by hosts with the feature enabled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How is consumption tracked for classic licensing model?

A

Application Security Units

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How are ASUs defined?

A

RAM in GB / 16 x number of activated features (RVA/RAP) x 24 x 365

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Why does RAP need RVA?

A

Because RAP uses RVA to analyse the vulnerability that the attack is based on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

3 locations to check consumption for RVA and RAP if you use DPS?

A

Account management
Data explorer
Environment API

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How is KSPM licensed?

A

Host hours

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

2 types of SPM?

A

VSPM
CSPM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How is VSPM licensed?

A

CPU sockets per year

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How is CSPM licensed?

A

host per year

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A host in the CSPM context applies to what kind of resources?

A

compute, database, and function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are users of the Security admin group allowed to do?

A

View and manage vulnerabilities if RVA is enabled and attacks if RAP is enabled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How can i fine tune permissions for users?

A

Assign view rights per environment or management zone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which modules are affected if full stack monitoring is not used and why?

A

Code vulnerability and third party vulnerability because not sufficient environmental information, such as reachable data assets or public internet exposure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

To detect third-party vulnerabilities in your environment what components are evaluated?

A

Software components
Runtime components

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What attributes of the component or library are checked by application security?

A

Name and version

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What providers are used for Third-party vulnerabilitie feed and how often are they checked?

A

Snyk and NVD (National Vulnerability Database)
Once every 5 min

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

For what kind of components is Snyk used for?

A

Software components (libraries)
Kube runtime components

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

For what kind of components is NVD used for?

A

Java runtime components
.NET runtime components
Node.JS runtime components

23
Q

What is the resolution time for a Third-party vulnerabilitie?

24
Q

What could cause the resoultion of a Third-party vulnerabilitie? (5)

A

Affected process was stopped
Vulnerable component was updated or removed
App is not using the vulnerable component
After a restart there is no traffic to the app so the component doesnt load
Vulnerability has been fixed in the code

25
What is the severity of a code level vulnerability?
Critical
26
Resolution reasons for code level vulnerabilities? (4)
Has been fixed in the code Has been fixed outside the app Affected process doesnt receive any traffic Affected process was stopped
27
How can you enable RVA on a more granular level?
enable/disable per supported technology
28
Overriding monitoring rules for third party vulnerabilities can be defined for which entity properties?
Host tag Process tag Management zone
29
From where and how can you enable RVA?
Enable RVA Application Security > Vulnerability Analytics > General settings. Enable technology Enable OneAgent feature flag code-level vulnerability evaluation
30
What does the name of a vulnerability contain?
Dynatace ID Then depends on feed: Snyk: Snyk ID CVE:vulnerability id CWE: vulnerability name
31
What are the 4 Risk assessment properties of a vulnerability?
Public internet exposure Reachable data assets Vulnerable function in use Public exploit published
32
4 statuses of a vulnerability
Open Resolved Muted Open Muted Resolved
33
7 reasons for a status change of a vulnerability
Opend or resolved Muted or unmuted The number of affected process groups has decreased or increased The risk assessment has changed The Davis Security Score has changed The CVSS has changed A new software component is detected
34
What are the 4 metrics based on which the DSS is calculated?
CVSS Score Attack vector Confidentiality Integrity
35
Why is DSS more precise than CVSS?
CVSS assumes worst case scenario while DSS analyses the context as well based on public internet exposure and reachable data assets
36
6 types of entities that can be related to a vulnerability
App Service Database Host Kube cluster Kube workload
37
What views is a MZ filter affecting on the vulnerability details page?
Related entities Vulnerable components
38
How many MZ can be associated with a vulnerability at max?
1000
39
What are the 4 attributes of a recommendation from the security advisor?
Library that needs to be upgraded Library tech logo number of highest critical vulnerabilities solved total vulnerabilities solved
40
What happens to existing vulnerabilities if you define a "do not monitor" rule that targets them?
They get "Resolved"
41
4 code vulnerabilities that Dynatrace detects and their context?
SQL Injection - SQL statement Command injection - command SSRF - request URL Improper input validation - JNDI lookup name
42
When is an attack path shown?
When RVA is activated When there are fewer than 500 attacks on a vulnerability
43
What does the attack path contain?
Source IP Entry point Vulnerability Target
44
What are the 3 notification integrations for vulnerabilities?
Webhook Jira Email
45
When is a notification triggered?
Open resolved New process group affected
46
What are the 6 properties of attacks that can be used when you define an allow rule?
Attacker IP Attack type Entry point payload Entry point domain Entry point port Entry point path
47
What are the standards supported for SPM?
CIS DORA NIST STIG
48
What is the component used to capture compliance data for SPM?
Kube Node config collector
49
How can i fix vulnerabilities in DT? (2)
Set up tracking links Update version according to davis security advisor
50
Are restarts required for 3rd party vulnerabilities? If so, when?
No
51
Are restarts required for code level vulnerabilities? If so, when?
Yes. Enable Global Enable per tech Enable OA feature New monitoring rule
52
Are restarts required for attacks? If so, when?
Yes. Enable Global Enable per tech Enable OA feature New monitoring rule
53
How long are vulnerabilities stored?
365 days if resolved within a year Next anniversary after resolution if resolved after a year
54
How long are attacks stored?
550 days