Splunk Enterprise must use organization-level authentication to uniquely identify and authenticate users.
An XCCDF Rule
Description
<VulnDiscussion>To assure accountability and prevent unauthenticated access, organizational users must be uniquely identified and authenticated to prevent potential misuse and compromise of the system. Sharing of accounts prevents accountability and non-repudiation. Organizational users must be uniquely identified and authenticated for all accesses.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>
- ID
- SV-251679r960969_rule
- Severity
- High
- References
- Updated
Remediation - Manual Procedure
This configuration is performed on the machine used as a search head or a deployment server, which may be a separate machine in a distributed environment.
Navigate to the $SPLUNK_HOME/etc/system/local/ directory.
Edit the authentication.conf file.