<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Dynatrace Workflows and malicious activity in Automations</title>
    <link>https://community.dynatrace.com/t5/Automations/Dynatrace-Workflows-and-malicious-activity/m-p/210306#M143</link>
    <description>&lt;P&gt;&lt;SPAN class="TextRun SCXW151167609 BCX0" data-contrast="none"&gt;&lt;SPAN class="NormalTextRun SCXW151167609 BCX0"&gt;Executing scripts and actions in my environment introduces new security risks compared to the &lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW151167609 BCX0"&gt;previous&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW151167609 BCX0"&gt; observability and security data gathering. &lt;BR /&gt;&lt;BR /&gt;What are you doing to ensure no malicious activity is coming from Dynatrace Workflows?&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class="EOP SCXW151167609 BCX0" data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Thu, 20 Jul 2023 11:16:38 GMT</pubDate>
    <dc:creator>AgataWlodarczyk</dc:creator>
    <dc:date>2023-07-20T11:16:38Z</dc:date>
    <item>
      <title>Dynatrace Workflows and malicious activity</title>
      <link>https://community.dynatrace.com/t5/Automations/Dynatrace-Workflows-and-malicious-activity/m-p/210306#M143</link>
      <description>&lt;P&gt;&lt;SPAN class="TextRun SCXW151167609 BCX0" data-contrast="none"&gt;&lt;SPAN class="NormalTextRun SCXW151167609 BCX0"&gt;Executing scripts and actions in my environment introduces new security risks compared to the &lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW151167609 BCX0"&gt;previous&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW151167609 BCX0"&gt; observability and security data gathering. &lt;BR /&gt;&lt;BR /&gt;What are you doing to ensure no malicious activity is coming from Dynatrace Workflows?&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class="EOP SCXW151167609 BCX0" data-ccp-props="{}"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 20 Jul 2023 11:16:38 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Automations/Dynatrace-Workflows-and-malicious-activity/m-p/210306#M143</guid>
      <dc:creator>AgataWlodarczyk</dc:creator>
      <dc:date>2023-07-20T11:16:38Z</dc:date>
    </item>
    <item>
      <title>Re: Dynatrace Workflows and malicious activity</title>
      <link>https://community.dynatrace.com/t5/Automations/Dynatrace-Workflows-and-malicious-activity/m-p/210307#M144</link>
      <description>&lt;P&gt;&lt;SPAN class="TextRun SCXW52267187 BCX0" data-contrast="none"&gt;&lt;SPAN class="NormalTextRun SCXW52267187 BCX0"&gt;Actions are exclusively run inside the Dynatrace platform and not directly inside a customer's environment. Furthermore, all actions are added via apps which both need to be installed by the customer first to make the actions available and are either directly developed by Dynatrace, partners, or the customer themselves. &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class="LineBreakBlob BlobObject DragDrop SCXW52267187 BCX0"&gt;&lt;SPAN class="SCXW52267187 BCX0"&gt;&amp;nbsp;&lt;BR /&gt;&lt;/SPAN&gt;&lt;BR class="SCXW52267187 BCX0" /&gt;&lt;/SPAN&gt;&lt;SPAN class="TextRun SCXW52267187 BCX0" data-contrast="none"&gt;&lt;SPAN class="NormalTextRun SCXW52267187 BCX0"&gt;Any action or customer (ad-hoc) script is run with a user context and is limited to data the user can access. Any action or script (aka function) can only communicate with the outside via HTTP calls. &lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW52267187 BCX0"&gt;The platform supports an allow list, which blocks any and all calls to unauthorized domains.&lt;/SPAN&gt; &lt;SPAN class="NormalTextRun AdvancedProofingIssueV2Themed SCXW52267187 BCX0"&gt;In order to&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW52267187 BCX0"&gt; give access to on-premise systems (&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun ContextualSpellingAndGrammarErrorV2Themed SCXW52267187 BCX0"&gt;e.g.&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW52267187 BCX0"&gt; Jira), Dynatrace &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class="TextRun Highlight SCXW52267187 BCX0" data-contrast="none"&gt;&lt;SPAN class="NormalTextRun SpellingErrorV2Themed SCXW52267187 BCX0"&gt;EdgeConnect&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class="TextRun SCXW52267187 BCX0" data-contrast="none"&gt;&lt;SPAN class="NormalTextRun SCXW52267187 BCX0"&gt; can be deployed &lt;/SPAN&gt;&lt;SPAN class="NormalTextRun AdvancedProofingIssueV2Themed SCXW52267187 BCX0"&gt;in order to&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW52267187 BCX0"&gt; work as an HTTP proxy with similar whitelisting and mapping rules for domains, both centrally in the platform and can be further limited on the local Dynatrace &lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SpellingErrorV2Themed SCXW52267187 BCX0"&gt;EdgeConnect&lt;/SPAN&gt;&lt;SPAN class="NormalTextRun SCXW52267187 BCX0"&gt; config.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 20 Apr 2023 10:58:41 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Automations/Dynatrace-Workflows-and-malicious-activity/m-p/210307#M144</guid>
      <dc:creator>michaelwinkler</dc:creator>
      <dc:date>2023-04-20T10:58:41Z</dc:date>
    </item>
  </channel>
</rss>

