Skip to content

No profile (default benchmark)

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000295-AU-000190

    <GroupDescription></GroupDescription>
    Group
  • Splunk Enterprise idle session timeout must be set to not exceed 15 minutes.

    &lt;VulnDiscussion&gt;Automatic session termination after a period of inactivity addresses the potential for a malicious actor to exploit the unatt...
    Rule Medium Severity
  • SRG-APP-000291-AU-000200

    <GroupDescription></GroupDescription>
    Group
  • Splunk Enterprise must notify the System Administrator (SA) and Information System Security Officer (ISSO) when account events are received (creation, deletion, modification, disabling).

    &lt;VulnDiscussion&gt;Once an attacker establishes access to an application, the attacker often attempts to create a persistent method of reestabli...
    Rule Low Severity
  • SRG-APP-000291-AU-000200

    <GroupDescription></GroupDescription>
    Group
  • Splunk Enterprise must notify analysts of applicable events for Tier 2 CSSP and JRSS only.

    &lt;VulnDiscussion&gt;Sending notifications or populating dashboards are ways to monitor and alert on applicable events and allow analysts to mitig...
    Rule Low Severity
  • SRG-APP-000065-AU-000240

    <GroupDescription></GroupDescription>
    Group
  • Splunk Enterprise must enforce the limit of 3 consecutive invalid logon attempts by a user during a 15 minute time period.

    &lt;VulnDiscussion&gt;By limiting the number of failed login attempts, the risk of unauthorized system access via user password guessing, otherwise...
    Rule Medium Severity
  • SRG-APP-000503-AU-000280

    <GroupDescription></GroupDescription>
    Group
  • Splunk Enterprise must be configured with a successful/unsuccessful logon attempts report.

    &lt;VulnDiscussion&gt;The SIEM or Central Log Server is the mitigation method for most of the other STIGs applied to an organization. Robust alerti...
    Rule Medium Severity
  • SRG-APP-000095-AU-000050

    <GroupDescription></GroupDescription>
    Group
  • The System Administrator (SA) and Information System Security Officer (ISSO) must configure the retention of the log records based on the defined security plan.

    &lt;VulnDiscussion&gt;If authorized individuals do not have the ability to modify auditing parameters in response to a changing threat environment,...
    Rule Low Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules