<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: CIS Hardening Benchmark that is applicable in Dynatrace Cluster Node (Manage) in Open Q&amp;A</title>
    <link>https://community.dynatrace.com/t5/Open-Q-A/CIS-Hardening-Benchmark-that-is-applicable-in-Dynatrace-Cluster/m-p/20805#M21</link>
    <description>&lt;P&gt;From the product security team's side I can say, that we haven't been looking into CIS hardening benchmarks as of now.&lt;/P&gt;&lt;P&gt;&lt;A rel="user" href="https://answers.dynatrace.com/users/5499/view.html" nodeid="5499"&gt;@Radoslaw S.&lt;/A&gt;, do you know if someone from the Managed team has been looking into this?&lt;/P&gt;</description>
    <pubDate>Tue, 18 Aug 2020 09:56:08 GMT</pubDate>
    <dc:creator>Michael_Plank</dc:creator>
    <dc:date>2020-08-18T09:56:08Z</dc:date>
    <item>
      <title>CIS Hardening Benchmark that is applicable in Dynatrace Cluster Node (Manage)</title>
      <link>https://community.dynatrace.com/t5/Open-Q-A/CIS-Hardening-Benchmark-that-is-applicable-in-Dynatrace-Cluster/m-p/20804#M20</link>
      <description>&lt;P&gt;For dynatrace node components like Cassandra and Nginx. Is it possible to apply CIS hardening benchmark on the said component., also is there any additional security components that configure during the installation. &lt;/P&gt;</description>
      <pubDate>Wed, 12 Aug 2020 09:40:15 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Open-Q-A/CIS-Hardening-Benchmark-that-is-applicable-in-Dynatrace-Cluster/m-p/20804#M20</guid>
      <dc:creator>richard_tecson</dc:creator>
      <dc:date>2020-08-12T09:40:15Z</dc:date>
    </item>
    <item>
      <title>Re: CIS Hardening Benchmark that is applicable in Dynatrace Cluster Node (Manage)</title>
      <link>https://community.dynatrace.com/t5/Open-Q-A/CIS-Hardening-Benchmark-that-is-applicable-in-Dynatrace-Cluster/m-p/20805#M21</link>
      <description>&lt;P&gt;From the product security team's side I can say, that we haven't been looking into CIS hardening benchmarks as of now.&lt;/P&gt;&lt;P&gt;&lt;A rel="user" href="https://answers.dynatrace.com/users/5499/view.html" nodeid="5499"&gt;@Radoslaw S.&lt;/A&gt;, do you know if someone from the Managed team has been looking into this?&lt;/P&gt;</description>
      <pubDate>Tue, 18 Aug 2020 09:56:08 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Open-Q-A/CIS-Hardening-Benchmark-that-is-applicable-in-Dynatrace-Cluster/m-p/20805#M21</guid>
      <dc:creator>Michael_Plank</dc:creator>
      <dc:date>2020-08-18T09:56:08Z</dc:date>
    </item>
    <item>
      <title>Re: CIS Hardening Benchmark that is applicable in Dynatrace Cluster Node (Manage)</title>
      <link>https://community.dynatrace.com/t5/Open-Q-A/CIS-Hardening-Benchmark-that-is-applicable-in-Dynatrace-Cluster/m-p/167581#M17366</link>
      <description>&lt;P&gt;Hi, we're running our most secure environments on RHEL-based hardened OS with CIS benchmark level 1. This is achievable for any customer. We're pretty good out-of-the-box for Nginx. For Cassandra and Elasticsearch (similar as Cassandra) it needs some more explanation. Find some answers to common security requirements related to Cassandra below:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;1. Ensure a separate user and group exist for Cassandra&lt;/STRONG&gt;&lt;BR /&gt;All Cassandra configuration files are automatically put in place by the Dynatrace Managed installation scripts.&lt;BR /&gt;Dynatrace managed creates a dedicated user "dynatrace" in group "dynatrace" that is used for Cassandra. The user dynatrace is non-privileged service user (no console) and is not used for anything other than Dynatrace Managed.&lt;BR /&gt;While it is not solely for Cassandra, the usage is limited to Dynatrace Managed services, which form an integrated suite. Since we manage these services and dependencies between them, single user for Dynatrace Managed is necessary.&lt;BR /&gt;&amp;nbsp;&lt;BR /&gt;&lt;STRONG&gt;2. Ensure that authentication is enabled for Cassandra databases&lt;/STRONG&gt;&lt;BR /&gt;Dynatrace Managed Cassandra nodes don't have authentication and authorization enabled. Dynatrace Managed mitigates that risk by automatically putting IP table rules (firewall rules) in place, which make sure that only Dynatrace server nodes are able to access the Cassandra port on the Cassandra nodes. Cassandra is used only by Dynatrace Managed internally.&lt;BR /&gt;Dynatrace is currently implementing a new storage system where authenticaion to databases is on the must have requirements list. This is a long term project though with no scheduled release date yet.&lt;BR /&gt;&amp;nbsp;&lt;BR /&gt;&lt;STRONG&gt;3. Ensure that authorization is enabled for Cassandra databases&amp;nbsp;&lt;/STRONG&gt;&lt;BR /&gt;Same as (2)&lt;BR /&gt;&amp;nbsp;&lt;BR /&gt;&lt;STRONG&gt;4. Ensure the Cassandra and superuser roles are separate&lt;/STRONG&gt;&lt;BR /&gt;Same as (2)&lt;BR /&gt;&amp;nbsp;&lt;BR /&gt;&lt;STRONG&gt;5. Ensure that the default password changed for the Cassandra role&amp;nbsp;&lt;/STRONG&gt;&lt;BR /&gt;Same as (2)&lt;BR /&gt;&amp;nbsp;&lt;BR /&gt;&lt;STRONG&gt;6. Ensure there are no unnecessary roles or excessive privileges&lt;/STRONG&gt;&lt;BR /&gt;Same as (2)&lt;BR /&gt;&amp;nbsp;&lt;BR /&gt;&lt;STRONG&gt;7. Ensure that Cassandra is run using a non-privileged, dedicated service account&lt;/STRONG&gt;&lt;BR /&gt;As explained in (1), we create a non-privileged service user for Dynatrace Managed that is used for Cassandra.&lt;BR /&gt;&amp;nbsp;&lt;BR /&gt;&lt;STRONG&gt;8. Review User-Defined Roles&lt;/STRONG&gt;&lt;BR /&gt;Same as (2)&lt;BR /&gt;&amp;nbsp;&lt;BR /&gt;&lt;STRONG&gt;9. Review Superuser/Admin Roles&lt;/STRONG&gt;&lt;BR /&gt;Same as (2)&lt;BR /&gt;&amp;nbsp;&lt;BR /&gt;&lt;STRONG&gt;10. Ensure that auditing is enabled&lt;/STRONG&gt;&lt;BR /&gt;Until version 4.0 is announced for Cassandra OpenSource.&lt;BR /&gt;Dynatrace is scanning all third party components (including Cassandra) for vulnerabilities (CVEs) using its own AppSec solution.&lt;BR /&gt;&amp;nbsp;&lt;BR /&gt;&lt;STRONG&gt;11. Inter-node Encryption&lt;/STRONG&gt;&lt;BR /&gt;Dynatrace Managed Cassandra nodes don't have inter-node or client encryption enabled due to potential performance overhead. To mitigate the risk, the Dynatrace Managed server infrastructure needs to be hardened on the OS and network level by the customer, to ensure only authorized personnel can access cluster nodes. For cases where there is a risk of intercepting the traffic traffic between cluster nodes, we recommend external encryption means (IPSec tunnels or hardware encryption)&lt;BR /&gt;&amp;nbsp;&lt;BR /&gt;12. Client Encryption&lt;BR /&gt;We currently don't support client encryption for Cassandra. Dynatrace Managed nodes are intended to operate in secured, internal network. Communication with Cassandra is only within Dynatrace cluster. For cases where there is a risk of intercepting the traffic between cluster nodes, we recommend external encryption means (IPSec tunnels or hardware encryption)&lt;/P&gt;</description>
      <pubDate>Mon, 14 Jun 2021 10:04:24 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Open-Q-A/CIS-Hardening-Benchmark-that-is-applicable-in-Dynatrace-Cluster/m-p/167581#M17366</guid>
      <dc:creator>Radoslaw_Szulgo</dc:creator>
      <dc:date>2021-06-14T10:04:24Z</dc:date>
    </item>
  </channel>
</rss>

