SPLK-CL-000260 - Splunk Enterprise must be configured to retain the identity of the original source host or device where the event occurred as part of the log record.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

In this case the information producer is the device based on IP address or some other identifier of the device producing the information. The source of the record must be bound to the record using cryptographic means.

Some events servers allow the administrator to retain only portions of the record sent by devices and hosts.

This requirement applies to log aggregation servers with the role of fulfilling the DoD requirement for a central log repository. The syslog, SIEM, or other event servers must retain this information with each log record to support incident investigations.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

Configure Splunk Enterprise to retain the identity of the original source host or device where the event occurred.

Use Splunk Enterprise to modify the props.conf file to include the identity of the original source host or device where the event occurred.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_Splunk_Enterprise_8-x_for-Linux_V1R5_STIG.zip

Item Details

References: CAT|II, CCI|CCI-000366, Rule-ID|SV-251674r879887_rule, STIG-ID|SPLK-CL-000260, Vuln-ID|V-251674

Plugin: Splunk

Control ID: 6a468f029fff17aafcbcc443d30bac4e913000e0af67693ef5f77869668c2584