SPLK-CL-000150 - Splunk Enterprise must be configured to offload log records onto a different system or media than the system being audited.

Information

Information stored in one location is vulnerable to accidental or incidental deletion or alteration.

Offloading is a common process in information systems with limited audit storage capacity. Although this may be part of the operating system function, for the enterprise events management system, this is most often a function managed through the application since it is a critical function and requires the use of a large amount of external storage.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

This configuration is performed on the machine used as a forwarder, which is always a separate machine regardless of environment.

On the forwarders, configure the outputs.conf with the information of the indexer that the data will be sent to for analysis.

This configuration is performed on the machine used as the assigned indexer to the forwarder in a distributed environment.

On the indexer, configure the inputs.conf file with the information of the forwarders that are sending the data for analysis.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Splunk_Enterprise_8-x_for-Linux_V1R5_STIG.zip

Item Details

Category: AUDIT AND ACCOUNTABILITY

References: 800-53|AU-4(1), CAT|II, CCI|CCI-001851, Rule-ID|SV-251668r879731_rule, STIG-ID|SPLK-CL-000150, Vuln-ID|V-251668

Plugin: Splunk

Control ID: efbd5bccf7aaf4c16db89c2cd3e5b5821d5911f101e6aa14f2dc5da64b3185e2