SPLK-CL-000045 - Splunk Enterprise must use an SSO proxy service, F5 device, or SAML implementation to accept the DoD CAC or other smart card credential for identity management, personal authentication, and multifactor authentication.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

The use of PIV credentials facilitates standardization and reduces the risk of unauthorized access.

DoD has mandated the use of the CAC to support identity management and personal authentication for systems covered under Homeland Security Presidential Directive (HSPD) 12, as well as a primary component of layered protection for national security systems.

If the application cannot meet this requirement, the risk may be mitigated through use of an authentication server.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

Configure an SSO proxy service using Apache, IIS, F5, SAML, etc., to provide CAC credentials to Splunk Enterprise.

Examples for Apache and F5 are provided using the supplemental documentation included in this package to be used in addition to the Splunk documentation.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Splunk_Enterprise_7-x_for_Windows_V2R4_STIG.zip

Item Details

References: CAT|II, CCI|CCI-001953, Rule-ID|SV-221605r879764_rule, STIG-ID|SPLK-CL-000045, STIG-Legacy|SV-111313, STIG-Legacy|V-102359, Vuln-ID|V-221605

Plugin: Splunk

Control ID: 19e468b3b3f58174b4b71b61e6c4b5497d6b3a5186e595c04541d494342da210