Splunk Enterprise 7.x for Windows Security Technical Implementation Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates +1
Comparison against the immediately-prior release (V2R2). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Added rules 1
- V-246917 Low The System Administrator (SA) and Information System Security Officer (ISSO) must configure the retention of the log records based on the defined security plan.
- RMF Control
- SC-13
- Severity
- H
- CCI
- CCI-002450
- Version
- SPLK-CL-000010
- Vuln IDs
-
- V-221600
- V-102349
- Rule IDs
-
- SV-221600r508660_rule
- SV-111305
Checks: C-23315r416257_chk
Select the Search and Reporting App. Execute a search query using the following: | rest splunk_server=local /services/server/info | fields fips_mode Verify that the report returns fips_mode = 1. If the query returns 0, this is a finding.
Fix: F-23304r416258_fix
FIPS 140-2 mode MUST be enabled during installation. If not enabled, it requires a reinstall or upgrade of the application. The installer must be executed from the command line so that it can be passed the LAUNCHSPLUNK=0 parameter. This allows Splunk to install and not automatically start up after install. Example: msiexec /i <splunkinstaller.msi> LAUNCHSPLUNK=0 Using a text editor, edit $SPLUNK_HOME/etc/splunk-launch.conf file, add the line SPLUNK_FIPS=1 to it, restart the server, and then recheck this requirement.
- RMF Control
- IA-2
- Severity
- H
- CCI
- CCI-000764
- Version
- SPLK-CL-000020
- Vuln IDs
-
- V-221601
- V-102351
- Rule IDs
-
- SV-221601r663926_rule
- SV-111307
Checks: C-23316r663925_chk
If the instance being checked is in a distributed environment and has the web interface disabled, this check is N/A. Select Settings >> Access Controls >> Authentication method. Verify that LDAP or SAML is selected. If LDAP or SAML is not selected, this is a finding.
Fix: F-23305r416261_fix
Select Settings >> Access Controls >> Authentication method. If using LDAP for user accounts: Select LDAP and create an LDAP strategy with the proper settings to connect to the LDAP server. Map the appropriate LDAP groups to the appropriate Splunk roles for proper user access. If using SAML for user accounts: Select SAML and create an SAML strategy with the proper settings to connect to the SAML provider. Map the appropriate SAML groups to the appropriate Splunk roles for proper user access.
- RMF Control
- IA-2
- Severity
- H
- CCI
- CCI-000764
- Version
- SPLK-CL-000030
- Vuln IDs
-
- V-221602
- V-102353
- Rule IDs
-
- SV-221602r508660_rule
- SV-111309
Checks: C-23317r416263_chk
Select Settings >> Access Controls >> Users. Verify that no user accounts exist with Authentication system set to Splunk except an account of last resort. They should all be set to LDAP or SAML. If any user accounts have Authentication system set to Splunk, with the exception of one emergency account of last resort, this is a finding.
Fix: F-23306r416264_fix
Select Settings >> Access Controls >> Users. Delete any user account with Authentication system set to Splunk, with the exception of one emergency account of last resort. Splunk will prevent the user from deleting an LDAP account.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-001953
- Version
- SPLK-CL-000045
- Vuln IDs
-
- V-221605
- V-102359
- Rule IDs
-
- SV-221605r663928_rule
- SV-111313
Checks: C-23320r663927_chk
If the instance being checked is in a distributed environment and has the web interface disabled, this check is N/A. Verify that Splunk Enterprise is configured to use the DoD CAC credential to log into the application. If it is not configured to allow the use of the DoD CAC credential, this is a finding.
Fix: F-23309r416273_fix
Configure an SSO proxy service using Apache, IIS, F5, SAML, etc., to provide CAC credentials to Splunk Enterprise. Examples for Apache and F5 are provided using the supplemental documentation included in this package to be used in addition to the Splunk documentation.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-001941
- Version
- SPLK-CL-000060
- Vuln IDs
-
- V-221607
- V-102363
- Rule IDs
-
- SV-221607r508660_rule
- SV-111315
Checks: C-23322r416278_chk
This check is performed on the machine used as a search head, which may be a separate machine in a distributed environment. If the instance being reviewed is not used as a search head, this check in N/A. Select Settings >> Server Settings >> General Settings and verify that Enable SSL in Splunk Web is set. If Enable SSL is not set, this is a finding.
Fix: F-23311r416279_fix
This configuration is performed on the machine used as a search head, which may be a separate machine in a distributed environment. Edit the following file in the installation to configure Splunk to use SSL certificates: $SPLUNK_HOME/etc/system/local/web.conf (Note that these files may exist in one of the following folders or its subfolders: $SPLUNK_HOME/etc/apps/ $SPLUNK_HOME/etc/slave-apps/) [settings] enableSplunkWebSSL = true privKeyPath = <path to the private key generated for the DoD approved certificate> serverCert = <path to the DoD approved certificate in PEM format>
- RMF Control
- SC-8
- Severity
- H
- CCI
- CCI-002418
- Version
- SPLK-CL-000070
- Vuln IDs
-
- V-221608
- V-102365
- Rule IDs
-
- SV-221608r508660_rule
- SV-111317
Checks: C-23323r416281_chk
Execute a search query in Splunk using the following: index=_internal source=*metrics.log* group=tcpin_connections | dedup hostname | table _time hostname sourceIp destPort ssl Verify that the report returns ssl = true for every item listed. If the report returns ssl = false for any item, this is a finding.
Fix: F-23312r416282_fix
Edit the following files in the installation to configure Splunk to use SSL certificates: (Note that these files may exist in one of the following folders or its subfolders: $SPLUNK_HOME/etc/apps/ $SPLUNK_HOME/etc/slave-apps/) This configuration is performed on the machine used as an indexer, which may be a separate machine in a distributed environment. $SPLUNK_HOME/etc/system/local/inputs.conf [splunktcp-ssl:9997] disabled = 0 [SSL] serverCert = <path to the DoD approved certificate in PEM format> sslPassword = <password for the certificate> This configuration is performed on the machine used as a forwarder, which is always a separate machine regardless of environment. $SPLUNK_HOME/etc/system/local/outputs.conf [tcpout:group1] disabled = 0 clientCert = <path to the DoD approved certificate in PEM format> sslPassword = <password for the certificate>
- RMF Control
- IA-5
- Severity
- H
- CCI
- CCI-000197
- Version
- SPLK-CL-000080
- Vuln IDs
-
- V-221609
- V-102367
- Rule IDs
-
- SV-221609r663930_rule
- SV-111319
Checks: C-23324r663929_chk
If the instance being checked is in a distributed environment and has the web interface disabled, this check is N/A. If using SAML for authentication, this check is N/A. Select Settings >> Access Controls >> Authentication method. Select LDAP Settings. Select the LDAP strategy and verify that SSL enabled is checked and the Port is set to 636. If SSL enabled is not checked, and Port is not 636, this is a finding.
Fix: F-23313r416285_fix
If using SAML for authentication, this fix is N/A. Select Settings >> Access Controls >> Authentication method. Select LDAP Settings. Select the LDAP strategy and check the option SSL enabled. Set Port to 636. Edit the following file in the installation to configure Splunk to use SSL certificates: $SPLUNK_HOME/etc/openldap/ldap.conf Add the following line: TLS_CACERT <path to the DoD approved certificate in PEM format>
- RMF Control
- AU-9
- Severity
- L
- CCI
- CCI-001348
- Version
- SPLK-CL-000105
- Vuln IDs
-
- V-221612
- V-102629
- Rule IDs
-
- SV-221612r508660_rule
- SV-111579
Checks: C-23327r416293_chk
Interview the SA to verify that a process exists to back up the Splunk log data every seven days, using the underlying OS backup tools, or another approved backup tool. If a backup plan does not exist for the Splunk log data, this is a finding.
Fix: F-23316r416294_fix
Implement a backup plan for the Splunk log data, following the Splunk documentation on backing up indexed data. Use the underlying OS backup tools, or another approved backup tool.
- RMF Control
- AU-10
- Severity
- M
- CCI
- CCI-000166
- Version
- SPLK-CL-000160
- Vuln IDs
-
- V-221613
- V-102373
- Rule IDs
-
- SV-221613r508660_rule
- SV-111323
Checks: C-23328r416296_chk
If the server being reviewed does not store index data, this check is N/A. Check the following file in the installation folder: $SPLUNK_HOME/etc/system/local/indexes.conf Verify that each organization-defined index stanza in brackets [ ] has the following line added: enableDataIntegrityControl=true If this line is missing or is set to false, this is a finding.
Fix: F-23317r416297_fix
If the server does not store index data, this fix is N/A. Edit the following file in the installation folder: $SPLUNK_HOME/etc/system/local/indexes.conf Add the following line to each organization-defined index stanza in brackets [ ]: enableDataIntegrityControl=true
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SPLK-CL-000170
- Vuln IDs
-
- V-221614
- V-102375
- Rule IDs
-
- SV-221614r508660_rule
- SV-111325
Checks: C-23329r416299_chk
Select Settings >> Data Inputs, and verify there are zero inputs configured under UDP. Splunk supports UDP, but it is not permissible to use. If any exist, this is a finding. If the Web UI is disabled, open an OS command prompt and type: netstat -a -p UDP If a UDP connection is displayed for 0.0.0.0:514, the instance is listening for Syslog port 514 in UDP, and this is a finding.
Fix: F-23318r416300_fix
Select Settings >> Data Inputs, and verify there are zero inputs configured under UDP. Remove any that exist and recreate using TCP. It is recommended to set these settings before disabling the web UI of the instance in a distributed environment.
- RMF Control
- AU-12
- Severity
- L
- CCI
- CCI-000174
- Version
- SPLK-CL-000250
- Vuln IDs
-
- V-221621
- V-102389
- Rule IDs
-
- SV-221621r508660_rule
- SV-111333
Checks: C-23336r416320_chk
Examine the site documentation that lists the scope of coverage for the instance being reviewed. Select Settings >> Data Inputs. Verify that data inputs are configured to support the scope of coverage documented for the site. If Splunk enterprise is not configured to aggregate log records from organization-defined devices and hosts within its scope of coverage, this is a finding.
Fix: F-23325r416321_fix
Configure Splunk Enterprise to aggregate log records from organization-defined devices and hosts within its scope of coverage, as defined in the site security plan.
- RMF Control
- AU-12
- Severity
- L
- CCI
- CCI-000171
- Version
- SPLK-CL-000270
- Vuln IDs
-
- V-221623
- V-102393
- Rule IDs
-
- SV-221623r538427_rule
- SV-111337
Checks: C-23338r569419_chk
If using LDAP: Select Settings >> Access Controls >> Authentication Method >> LDAP Settings >> Map Groups. Obtain the group name mapped to the power user role. Request from the LDAP administrator the group membership of this LDAP group, and compare to the list of individuals appointed by the ISSM. If using SAML: Select Settings >> Access Controls >> Authentication Method >> SAML Settings >> Map Groups. Obtain the group name mapped to the power user role. Request from the SAML administrator the group membership of this SAML group, and compare to the list of individuals appointed by the ISSM. If users that are not defined by the ISSM as requiring elevated rights are present in the power user role membership, this is a finding.
Fix: F-23327r569412_fix
Provide the list of individuals assigned by the ISSM to be members of the power user role to the LDAP/AD administrator or SAML Identity Provider administrator to add to the security group mapped to the power user role.
- RMF Control
- AU-5
- Severity
- L
- CCI
- CCI-001855
- Version
- SPLK-CL-000290
- Vuln IDs
-
- V-221625
- V-102397
- Rule IDs
-
- SV-221625r508660_rule
- SV-111341
Checks: C-23340r416332_chk
Perform the following checks. If any do not comply, this is a finding. (Note that these files may exist in one of the following folders or its subfolders: $SPLUNK_HOME/etc/apps/ $SPLUNK_HOME/etc/slave-apps/) 1. Examine the file in the Splunk installation folder: $SPLUNK_HOME/etc/system/local/server.conf Locate the following setting: [diskUsage] minFreeSpace = xxxx Verify that the value is set to 25 percent of the size of the storage volume. For example, 25 percent of a 100 GB drive is 25 GB, and the value set would be 25000, as the value is in megabytes. 2. Examine the file in the Splunk installation folder: $SPLUNK_HOME/etc/system/local/health.conf Locate the following setting: [alert_action:email] disabled = 0 action.to = action.cc = Verify that the email addresses of the ISSO and SA are set to receive alerts. This email address can be a group address (example alerts@domain.com) that contains the addresses of the ISSO and SA. 3. In the Splunk console, select Settings >> Health Report Manager >> feature:disk_space. Verify Red setting is 1, and Yellow setting is 2.
Fix: F-23329r416333_fix
Perform the following fixes. (Note that these files may exist in one of the following folders or its subfolders: $SPLUNK_HOME/etc/apps/ $SPLUNK_HOME/etc/slave-apps/) 1. Edit the file in the Splunk installation folder: $SPLUNK_HOME/etc/system/local/server.conf Add the following lines: [diskUsage] minFreeSpace = xxxx Set the value to 25 percent of the size of the storage volume. For example, 25 percent of a 100 GB drive is 25 GB, and the value set would be 25000, as the value is in megabytes. 2. Examine the file in the Splunk installation folder: $SPLUNK_HOME/etc/system/local/health.conf Add the following lines: [alert_action:email] disabled = 0 action.to = action.cc = Set the email addresses of the ISSO and SA to be able to receive alerts. This email address can be a group address (example alerts@domain.com) that contains the addresses of the ISSO and SA. 3. In the Splunk console, select Settings >> Health Report Manager >> feature:disk_space. Set the Red setting to 1, and Yellow setting to 2.
- RMF Control
- AU-5
- Severity
- L
- CCI
- CCI-001858
- Version
- SPLK-CL-000300
- Vuln IDs
-
- V-221626
- V-102399
- Rule IDs
-
- SV-221626r508660_rule
- SV-111343
Checks: C-23341r416335_chk
If the Splunk instance is used for Tier 2 CSSP (formerly CND-SP) or JRSS analysis, this check is N/A. Interview the SA to verify that a process exists to notify the SA and ISSO of any audit failure, such as loss of communication or logs no longer being collected. Interview the ISSO to confirm receipt of this notification. If a report does not exist to notify the SA and ISSO of audit failure events, or the ISSO does not confirm receipt of the report, this is a finding.
Fix: F-23330r416336_fix
If the Splunk instance is used for Tier 2 CSSP (formerly CND-SP) or JRSS analysis, this fix is N/A. Configure Splunk Enterprise using the reporting and notification tools to create a report with notification to the SA and ISSO of any audit failure events, such as loss of communication or logs no longer being collected.
- RMF Control
- AU-5
- Severity
- L
- CCI
- CCI-001861
- Version
- SPLK-CL-000310
- Vuln IDs
-
- V-221627
- V-102401
- Rule IDs
-
- SV-221627r508660_rule
- SV-111345
Checks: C-23342r416338_chk
If the Splunk instance is used for Tier 2 CSSP (formerly CND-SP) or JRSS analysis, this check is N/A. Interview the SA to verify that a process exists to notify the SA and ISSO of any audit failure, such as loss of communication or logs no longer being collected. Interview the ISSO to confirm receipt of this notification. If a report does not exist to notify the SA and ISSO of audit failure events, or the ISSO does not confirm receipt of the report, this is a finding.
Fix: F-23331r416339_fix
If the Splunk instance is used for Tier 2 CSSP (formerly CND-SP) or JRSS analysis, this fix is N/A. Configure Splunk Enterprise using the reporting and notification tools to create a report with notification to the SA and ISSO of any audit failure events, such as loss of communication or logs no longer being collected.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- SPLK-CL-000320
- Vuln IDs
-
- V-221628
- V-102403
- Rule IDs
-
- SV-221628r508660_rule
- SV-111347
Checks: C-23343r416341_chk
Interview the SA to verify that a process exists to notify the SA and ISSO, at a minimum, when an attack is detected on multiple devices and hosts within its scope of coverage. Interview the ISSO to confirm receipt of this notification. If a report does not exist, or the ISSO does not confirm receipt of this report, this is a finding.
Fix: F-23332r416342_fix
Configure Splunk Enterprise, using the reporting and notification tools, to notify the SA and ISSO, at a minimum, when an attack is detected on multiple devices and hosts within its scope of coverage.
- RMF Control
- IA-5
- Severity
- L
- CCI
- CCI-000192
- Version
- SPLK-CL-000330
- Vuln IDs
-
- V-221629
- V-102405
- Rule IDs
-
- SV-221629r508660_rule
- SV-111349
Checks: C-23344r416344_chk
Select Settings >> Access Controls >> Password Policy Management and verify that Uppercase is set to greater than 0. If Uppercase is set to 0, this is a finding.
Fix: F-23333r416345_fix
Select Settings >> Access Controls >> Password Policy Management and set Uppercase to greater than 0.
- RMF Control
- IA-5
- Severity
- L
- CCI
- CCI-000193
- Version
- SPLK-CL-000340
- Vuln IDs
-
- V-221630
- V-102407
- Rule IDs
-
- SV-221630r508660_rule
- SV-111351
Checks: C-23345r416347_chk
Select Settings >> Access Controls >> Password Policy Management and verify that Lowercase is set to greater than 0. If Lowercase is set to 0, this is a finding.
Fix: F-23334r416348_fix
Select Settings >> Access Controls >> Password Policy Management and set Lowercase to greater than 0.
- RMF Control
- IA-5
- Severity
- L
- CCI
- CCI-000194
- Version
- SPLK-CL-000350
- Vuln IDs
-
- V-221631
- V-102409
- Rule IDs
-
- SV-221631r508660_rule
- SV-111353
Checks: C-23346r416350_chk
Select Settings >> Access Controls >> Password Policy Management and verify that Numeral is set to greater than 0. If Numeral is set to 0, this is a finding.
Fix: F-23335r416351_fix
Select Settings >> Access Controls >> Password Policy Management and set Numeral to greater than 0.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000205
- Version
- SPLK-CL-000360
- Vuln IDs
-
- V-221632
- V-102411
- Rule IDs
-
- SV-221632r508660_rule
- SV-111355
Checks: C-23347r416353_chk
Select Settings >> Access Controls >> Password Policy Management and verify that Minimum characters is set to 15 or more. If Minimum characters is less than 15, this is a finding.
Fix: F-23336r416354_fix
Select Settings >> Access Controls >>Password Policy Management and set Minimum characters to 15 or more.
- RMF Control
- IA-5
- Severity
- L
- CCI
- CCI-001619
- Version
- SPLK-CL-000370
- Vuln IDs
-
- V-221633
- V-102413
- Rule IDs
-
- SV-221633r508660_rule
- SV-111357
Checks: C-23348r416356_chk
Select Settings >> Access Controls >> Password Policy Management and verify that Special character is set to greater than 0. If Special character is set to 0, this is a finding.
Fix: F-23337r416357_fix
Select Settings >> Access Controls >> Password Policy Management and set Special character to greater than 0.
- RMF Control
- IA-5
- Severity
- L
- CCI
- CCI-000199
- Version
- SPLK-CL-000380
- Vuln IDs
-
- V-221634
- V-102415
- Rule IDs
-
- SV-221634r508660_rule
- SV-111359
Checks: C-23349r416359_chk
Select Settings >> Access Controls >> Password Policy Management and verify that Expiration is Enabled and Days until password expires is set to 60. If not set this way, this is a finding.
Fix: F-23338r416360_fix
Select Settings >> Access Controls >> Password Policy Management and set Expiration to Enabled and Days until password expires to 60.
- RMF Control
- IA-5
- Severity
- L
- CCI
- CCI-000200
- Version
- SPLK-CL-000390
- Vuln IDs
-
- V-221635
- V-102417
- Rule IDs
-
- SV-221635r508660_rule
- SV-111361
Checks: C-23350r416362_chk
Select Settings >> Access Controls >> Password Policy Management and verify that History is Enabled and Password history count is set to 5 or more. If not set to 5 or more, this is a finding.
Fix: F-23339r416363_fix
Select Settings >> Access Controls >> Password Policy Management and set History to Enabled and Password history count to 5 or more.
- RMF Control
- AC-8
- Severity
- L
- CCI
- CCI-000048
- Version
- SPLK-CL-000035
- Vuln IDs
-
- V-221931
- V-102355
- Rule IDs
-
- SV-221931r508660_rule
- SV-111311
Checks: C-23645r420261_chk
Verify that the Standard Mandatory DoD Notice and Consent Banner appears and provides for user acknowledgement before being granted access to Splunk Enterprise. If the Standard Mandatory DoD Notice and Consent Banner is not presented, or the user is not required to acknowledge the notice, this is a finding.
Fix: F-23634r420262_fix
Configure an external SSO proxy service, such as Apache, IIS, F5, SAML, etc., to provide the notification and acknowledgement. Examples for Apache and F5 are provided as supplemental documentation included in this package.
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-002470
- Version
- SPLK-CL-000040
- Vuln IDs
-
- V-221932
- V-102419
- Rule IDs
-
- SV-221932r508660_rule
- SV-111363
Checks: C-23646r420264_chk
Verify the properties of the certificates used by Splunk to ensure that the Issuer is the DoD trusted CA. Check the following files for the certificates in use by Splunk. This file is located on the machine used as the search head, which may be a separate machine in a distributed environment. $SPLUNK_HOME/etc/system/local/web.conf [settings] serverCert = <path to the DoD approved certificate in PEM format> This file is located on the machine used as an indexer, which may be a separate machine in a distributed environment. $SPLUNK_HOME/etc/system/local/inputs.conf [SSL] serverCert = <path to the DoD approved certificate in PEM format> This file is located on the machine used as a forwarder, which is always a separate machine regardless of environment. $SPLUNK_HOME/etc/system/local/outputs.conf [tcpout:group1] clientCert = <path to the DoD approved certificate in PEM format> Verify each certificate listed above with the following command: openssl x509 -text -inform PEM -in <name of cert> If the certificate issuer is not a DoD trusted CA, this is a finding.
Fix: F-23635r420265_fix
Request a DoD-approved certificate and a copy of the DoD root CA public certificate and place the files in a location for Splunk use. Configure the certificate files to the PEM format using the Splunk Enterprise system documentation.
- RMF Control
- IA-7
- Severity
- H
- CCI
- CCI-000803
- Version
- SPLK-CL-000050
- Vuln IDs
-
- V-221933
- V-102439
- Rule IDs
-
- SV-221933r508660_rule
- SV-111387
Checks: C-23647r420267_chk
In the Splunk installation folder, check the following files in the $SPLUNK_HOME/etc/system/local folder: (Note that these files may exist in one of the following folders or its subfolders: $SPLUNK_HOME/etc/apps/ $SPLUNK_HOME/etc/slave-apps/) inputs.conf Check for the following lines; if they do not exist, the settings are compliant. If they exist, they must match the settings below: sslVersions = tls1.2 cipherSuite = ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-GCM- SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA- AES128-SHA256:ECDHE-RSA-AES128-SHA256 ecdhCurves = prime256v1, secp384r1, secp521r1 outputs.conf Check for the following lines; if they do not exist, the settings are compliant. If they exist, they must match the settings below: sslVersions = tls1.2 cipherSuite = ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-GCM- SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA- AES128-SHA256:ECDHE-RSA-AES128-SHA256 ecdhCurves = prime256v1, secp384r1, secp521r1 server.conf Check for the following lines; if they do not exist, the settings are compliant. If they exist, they must match the settings below: sslVersions = tls1.2 sslVersionsForClient = tls1.2 cipherSuite = ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-GCM- SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA- AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-GCM-SHA384:AES128-GCM-SHA256:AES128-SHA256 ecdhCurves = prime256v1, secp384r1, secp521r1 web.conf Check for the following lines; if they do not exist, the settings are compliant. If they exist, they must match the settings below: sslVersions = tls1.2 cipherSuite = ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-GCM- SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA- AES128-SHA256:ECDHE-RSA-AES128-SHA256 ecdhCurves = prime256v1, secp384r1, secp521r1 Check the following file in the $SPLUNK_HOME/etc/openldap folder: ldap.conf Check for the following lines; they must match the settings below: #TLS_PROTOCOL_MIN: 3.1 for TLSv1.0, 3.2 for TLSv1.1, 3.3 for TLSv1.2. TLS_PROTOCOL_MIN 3.3 TLS_CIPHER_SUITE ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-GCM- SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA- AES128-SHA256:ECDHE-RSA-AES128-SHA256 If any of the above settings do not match, this is a finding.
Fix: F-23636r420268_fix
In the Splunk installation folder, check the following files in the $SPLUNK_HOME/etc/system/local folder: (Note that these files may exist in one of the following folders or its subfolders: $SPLUNK_HOME/etc/apps/ $SPLUNK_HOME/etc/slave-apps/) inputs.conf Check for the following lines; if they do not exist, the settings are compliant. If they exist, they must match the settings below or be removed: sslVersions = tls1.2 cipherSuite = ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-GCM- SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA- AES128-SHA256:ECDHE-RSA-AES128-SHA256 ecdhCurves = prime256v1, secp384r1, secp521r1 outputs.conf Check for the following lines; if they do not exist, the settings are compliant. If they exist, they must match the settings below or be removed: sslVersions = tls1.2 cipherSuite = ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-GCM- SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA- AES128-SHA256:ECDHE-RSA-AES128-SHA256 ecdhCurves = prime256v1, secp384r1, secp521r1 server.conf Check for the following lines; if they do not exist, the settings are compliant. If they exist, they must match the settings below or be removed: sslVersions = tls1.2 sslVersionsForClient = tls1.2 cipherSuite = ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-GCM- SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA- AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-GCM-SHA384:AES128-GCM-SHA256:AES128-SHA256 ecdhCurves = prime256v1, secp384r1, secp521r1 web.conf Check for the following lines; if they do not exist, the settings are compliant. If they exist, they must match the settings below or be removed: sslVersions = tls1.2 cipherSuite = ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-GCM- SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA- AES128-SHA256:ECDHE-RSA-AES128-SHA256 ecdhCurves = prime256v1, secp384r1, secp521r1 Check the following file in the $SPLUNK_HOME/etc/openldap folder: ldap.conf Check for the following lines; they must match the settings below: #TLS_PROTOCOL_MIN: 3.1 for TLSv1.0, 3.2 for TLSv1.1, 3.3 for TLSv1.2. TLS_PROTOCOL_MIN 3.3 TLS_CIPHER_SUITE ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-GCM- SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA- AES128-SHA256:ECDHE-RSA-AES128-SHA256
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- SPLK-CL-000090
- Vuln IDs
-
- V-221934
- V-102369
- Rule IDs
-
- SV-221934r508660_rule
- SV-111321
Checks: C-23648r420270_chk
If the Splunk Installation is not distributed among multiple servers, this check is N/A. If the machine being reviewed is not designated as a search head, check the following file in the Splunk installation folders: $SPLUNK_HOME/etc/system/local/web.conf Check for the following lines: [settings] startwebserver = 0 If the startwebserver = 0 line is missing, or is = 1, this is a finding. If the machine being reviewed is not designated as an indexer, check the following file in the Splunk installation folders: $SPLUNK_HOME/etc/system/local/indexes.conf If this file exists, this is a finding. This file should only exist on an instance designated as an indexer.
Fix: F-23637r420271_fix
If the Splunk Installation is not distributed among multiple servers, this fix is N/A. Select Settings >> Monitoring Console. In the Monitoring Console, select Settings >> General Setup. Set the Mode type based on the implementation design. If Mode is set to Distributed, set each instance only with the server roles necessary for the desired functions. On instances not designated as search heads, disable the web UI by using the following command: ./splunk disable webserver On instances not designated as indexers, remove the file: $SPLUNK_HOME/etc/system/local/indexes.conf
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-000162
- Version
- SPLK-CL-000100
- Vuln IDs
-
- V-221935
- V-102437
- Rule IDs
-
- SV-221935r508660_rule
- SV-111383
Checks: C-23649r420273_chk
This check must be done as a server administrator. From an Explorer window, right-click on the Splunk target installation folder and select Properties. Select the Security tab and then the Advanced button. Verify that Administrators and SYSTEM are the only accounts listed and are set to Full Control. If accounts other than Administrators and SYSTEM are listed, this is a finding.
Fix: F-23638r420274_fix
This fix must be done as a server administrator. From an Explorer window, right-click on the Splunk target installation folder and select Properties. Select the Security tab >> Advanced >> Disable inheritance >> Convert inherited permissions into explicit permissions on this object. Remove all permission entries except Administrators and SYSTEM, and select OK.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- SPLK-CL-000175
- Vuln IDs
-
- V-221936
- V-102377
- Rule IDs
-
- SV-221936r508660_rule
- SV-111327
Checks: C-23650r420276_chk
If the server being reviewed is not a forwarder, this check is N/A. In the Splunk installation folder, check the following file in the $SPLUNK_HOME/etc/system/local folder: outputs.conf Locate the section similar to: [tcpout:group1] useACK=true Note that group1 may be named differently depending on how tcpout was configured. If the useACK=true statement is missing or set to false, this is a finding.
Fix: F-23639r420277_fix
If the server is not a forwarder, this check is N/A. In the Splunk installation folder, edit the following file in the $SPLUNK_HOME/etc/system/local folder: outputs.conf Locate the section similar to: [tcpout:group1] Note that group1 may be named differently depending on how tcpout was configured. Add the following line under the group stanza above: useACK=true
- RMF Control
- IA-11
- Severity
- L
- CCI
- CCI-002038
- Version
- SPLK-CL-000180
- Vuln IDs
-
- V-221937
- V-102421
- Rule IDs
-
- SV-221937r508660_rule
- SV-111365
Checks: C-23651r420279_chk
Select Settings >> Server Settings >> General Settings and verify that Session timeout is set to 15 minutes or less. If Splunk is not configured to 15 minutes or less, this is a finding.
Fix: F-23640r420280_fix
Select Settings >> Server Settings >> General Settings and set Session timeout to 15 minutes or less.
- RMF Control
- AC-12
- Severity
- M
- CCI
- CCI-002361
- Version
- SPLK-CL-000190
- Vuln IDs
-
- V-221938
- V-102423
- Rule IDs
-
- SV-221938r508660_rule
- SV-111367
Checks: C-23652r420282_chk
Select Settings >> Server Settings >> General Settings and verify that Session timeout is set to 15 minutes or less. If Splunk is not configured to 15 minutes or less, this is a finding.
Fix: F-23641r420283_fix
Select Settings >> Server Settings >> General Settings and set Session timeout to 15 minutes or less.
- RMF Control
- AC-2
- Severity
- L
- CCI
- CCI-001683
- Version
- SPLK-CL-000200
- Vuln IDs
-
- V-221939
- V-102425
- Rule IDs
-
- SV-221939r508660_rule
- SV-111369
Checks: C-23653r420285_chk
If the Splunk instance is used for Tier 2 CSSP (formerly CND-SP) or JRSS analysis, this check is N/A. Interview the SA to verify that a process exists to notify the SA and ISSO when account events are received for all devices and hosts within its scope of coverage. Interview the ISSO to confirm receipt of this notification. If Splunk Enterprise is not configured to notify the SA and ISSO when account events are received for all devices and hosts within its scope of coverage, this is a finding.
Fix: F-23642r420286_fix
If the Splunk instance is used for Tier 2 CSSP (formerly CND-SP) or JRSS analysis, this fix is N/A. Configure Splunk Enterprise, using the reporting and notification tools, to notify the SA and ISSO when account events are received for all devices and hosts within its scope of coverage.
- RMF Control
- AC-2
- Severity
- L
- CCI
- CCI-001683
- Version
- SPLK-CL-000235
- Vuln IDs
-
- V-221940
- V-102385
- Rule IDs
-
- SV-221940r508660_rule
- SV-111389
Checks: C-23654r420288_chk
This check applies to Tier 2 CSSP or JRSS instances only. Verify that notifications and dashboards are configured in accordance with designated SSPs, SOPs, and/or TTPs. The absence of notifications and dashboards is a finding.
Fix: F-23643r420289_fix
This fix applies to Tier 2 CSSP or JRSS instances only. Configure Splunk notifications and dashboards in accordance with designated SSPs, SOPs, and/or TTPs.
- RMF Control
- AC-7
- Severity
- M
- CCI
- CCI-000044
- Version
- SPLK-CL-000240
- Vuln IDs
-
- V-221941
- V-102387
- Rule IDs
-
- SV-221941r508660_rule
- SV-111331
Checks: C-23655r420291_chk
Select Settings >> Access Controls >> Password Policy Management. Verify that Lockout is Enabled, Failed login attempts is set to 3, and Lockout threshold in minutes is set to 15. If these settings are not set as described, this is a finding.
Fix: F-23644r420292_fix
Select Settings >> Access Controls >> Password Policy Management. Set Lockout to Enabled. Set Failed login attempts to 3 and Lockout threshold in minutes to 15.
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-000172
- Version
- SPLK-CL-000280
- Vuln IDs
-
- V-221942
- V-102395
- Rule IDs
-
- SV-221942r508660_rule
- SV-111339
Checks: C-23656r420294_chk
If the Splunk instance is used for Tier 2 CSSP (formerly CND-SP) or JRSS analysis, this check is N/A. Interview the System Administrator (SA) to demonstrate that a logon attempts report exists. If a report does not exist, this is a finding.
Fix: F-23645r420295_fix
If the Splunk instance is used for Tier 2 CSSP (formerly CND-SP) or JRSS analysis, this fix is N/A. Configure Splunk Enterprise using the reporting and notification tools to create a report that audits the logon attempts. Make this report available to the ISSM and other required individuals.
- RMF Control
- AU-12
- Severity
- L
- CCI
- CCI-001914
- Version
- SPLK-CL-000260
- Vuln IDs
-
- V-246917
- V-102391
- Rule IDs
-
- SV-246917r768746_rule
- SV-111335
Checks: C-50349r768744_chk
Examine the site documentation for the retention time for log data. Examine the following file in the Splunk installation folder: (Note that these files may exist in one of the following folders or its subfolders: $SPLUNK_HOME/etc/apps/ $SPLUNK_HOME/etc/slave-apps/) $SPLUNK_HOME/etc/system/local/indexes.conf For each index defined in the scope, the frozenTimePeriodInSecs setting must match the site documentation. If the settings do not match, this is a finding.
Fix: F-50303r768745_fix
Edit the following file in the Splunk installation folder: (Note that these files may exist in one of the following folders or its subfolders: $SPLUNK_HOME/etc/apps/ $SPLUNK_HOME/etc/slave-apps/) $SPLUNK_HOME/etc/system/local/indexes.conf Set frozenTimePeriodInSecs to the defined retention period for each index location.