DISA STIG Splunk Enterprise 8.x for Linux v1r4 STIG OS

Warning! Audit Deprecated

This audit file has been deprecated and will be removed in a future update.

View Next Version

Audit Details

Name: DISA STIG Splunk Enterprise 8.x for Linux v1r4 STIG OS

Updated: 12/22/2023

Authority: DISA STIG

Plugin: Unix

Revision: 1.3

Estimated Item Count: 15

Audit Items

DescriptionCategories
DISA_STIG_Splunk_Enterprise_8.x_for_Linux_OS_v1r4.audit from DISA Splunk Enterprise 8.x for Linux v1r4 STIG
SPLK-CL-000010 - Splunk Enterprise idle session timeout must be set to not exceed 15 minutes.
SPLK-CL-000060 - Splunk Enterprise must enforce the limit of three consecutive invalid logon attempts by a user during a 15-minute time period
SPLK-CL-000070 - Splunk Enterprise must automatically lock the account until the locked account is released by an administrator when three unsuccessful login attempts in 15 minutes are exceeded.
SPLK-CL-000090 - Splunk Enterprise must be configured to protect the log data stored in the indexes from alteration.
SPLK-CL-000120 - The System Administrator (SA) and Information System Security Manager (ISSM) must configure the retention of the log records based on the defined security plan.
SPLK-CL-000190 - Splunk Enterprise installation directories must be secured.
SPLK-CL-000340 - Splunk Enterprise must be configured to enforce password complexity by requiring that at least one uppercase character be used.
SPLK-CL-000350 - Splunk Enterprise must be configured to enforce password complexity by requiring that at least one lowercase character be used.
SPLK-CL-000360 - Splunk Enterprise must be configured to enforce password complexity by requiring that at least one numeric character be used.
SPLK-CL-000370 - Splunk Enterprise must be configured to enforce a minimum 15-character password length.
SPLK-CL-000380 - Splunk Enterprise must be configured to enforce password complexity by requiring that at least one special character be used.
SPLK-CL-000400 - Splunk Enterprise must be configured to enforce a 60-day maximum password lifetime restriction.
SPLK-CL-000410 - Splunk Enterprise must be configured to prohibit password reuse for a minimum of five generations
SPLK-CL-000430 - Splunk Enterprise must use TLS 1.2 and SHA-2 or higher cryptographic algorithms