SPLK-CL-000280 - Splunk Enterprise must be configured with a successful/unsuccessful logon attempts report.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

The SIEM or Central Log Server is the mitigation method for most of the other STIGs applied to an organization. Robust alerting and reporting is a key feature in any incident response plan.

The ability to report on logon attempts is the first step is creating a chain of events for a forensic analysis and incident response.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

If the Splunk instance is used for Tier 2 CSSP (formerly CND-SP) or JRSS analysis, this fix is N/A.

Configure Splunk Enterprise using the reporting and notification tools to create a report that audits the logon attempts. Make this report available to the ISSM and other required individuals.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Splunk_Enterprise_7-x_for_Windows_V2R3_STIG.zip

Item Details

References: CAT|II, CCI|CCI-000172, Rule-ID|SV-221942r508660_rule, STIG-ID|SPLK-CL-000280, STIG-Legacy|SV-111339, STIG-Legacy|V-102395, Vuln-ID|V-221942

Plugin: Splunk

Control ID: e2634e79a090531672e661a9d84eca4db96a2adfba0d3e5412d9fd60fcc1452c