SPLK-CL-000280 - Splunk Enterprise must be configured with a successful/unsuccessful logon attempts report.

Information

The SIEM or Central Log Server is the mitigation method for most of the other STIGs applied to an organization. Robust alerting and reporting is a key feature in any incident response plan.

The ability to report on logon attempts is the first step is creating a chain of events for a forensic analysis and incident response.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

If the Splunk instance is used for Tier 2 CSSP (formerly CND-SP) or JRSS analysis, this fix is N/A.

Configure Splunk Enterprise using the reporting and notification tools to create a report that audits the logon attempts. Make this report available to the ISSM and other required individuals.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Splunk_Enterprise_7-x_for_Windows_V2R4_STIG.zip

Item Details

Category: AUDIT AND ACCOUNTABILITY

References: 800-53|AU-12c., CAT|II, CCI|CCI-000172, Rule-ID|SV-221942r879874_rule, STIG-ID|SPLK-CL-000280, STIG-Legacy|SV-111339, STIG-Legacy|V-102395, Vuln-ID|V-221942

Plugin: Splunk

Control ID: 018418a253a8a87b4aec5bb1738f283e155a4996a09282fe87f7e7ed3348673e