SPLK-CL-000030 - Splunk Enterprise must have all local user accounts removed after implementing organizational level user management system, except for one emergency account of last resort.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

User accounts should use an organizational level authentication mechanism such as SAML, LDAP, AD, etc., to provide centralized management.

The use of local accounts should be discouraged, except for an emergency account of last resort.

The use of local accounts instead of organizational level accounts creates a risk where accounts are not properly disabled or deleted when users depart or their roles change.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

Select Settings >> Access Controls >> Users.

Delete any user account with Authentication system set to Splunk, with the exception of one emergency account of last resort. Splunk will prevent the user from deleting an LDAP account.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Splunk_Enterprise_7-x_for_Windows_V2R3_STIG.zip

Item Details

References: CAT|I, CCI|CCI-000764, Rule-ID|SV-221602r508660_rule, STIG-ID|SPLK-CL-000030, STIG-Legacy|SV-111309, STIG-Legacy|V-102353, Vuln-ID|V-221602

Plugin: Splunk

Control ID: a15d5594e1a5c7ef29c2844f9256e820aa24c04af94f6074cee44a1c968a3056