Skip to content

I - Mission Critical Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000169-AU-002520

    <GroupDescription></GroupDescription>
    Group
  • Splunk Enterprise must enforce password complexity for the account of last resort by requiring that at least one special character be used.

    &lt;VulnDiscussion&gt;Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, ...
    Rule Low Severity
  • SRG-APP-000174-AU-002570

    <GroupDescription></GroupDescription>
    Group
  • Splunk Enterprise must enforce a 60-day maximum password lifetime restriction for the account of last resort.

    &lt;VulnDiscussion&gt;Any password, no matter how complex, can eventually be cracked. Therefore, passwords need to be changed at specific intervals...
    Rule Low Severity
  • SRG-APP-000165-AU-002580

    <GroupDescription></GroupDescription>
    Group
  • Splunk Enterprise must prohibit password reuse for a minimum of five generations for the account of last resort.

    &lt;VulnDiscussion&gt;Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute...
    Rule Low Severity
  • SRG-APP-000068-AU-000035

    <GroupDescription></GroupDescription>
    Group
  • Splunk Enterprise must display the Standard Mandatory DOD Notice and Consent Banner and accept user acknowledgement before granting access to the application.

    &lt;VulnDiscussion&gt;Display of the DOD-approved use notification before granting access to the application ensures privacy and security notificat...
    Rule Low Severity
  • SRG-APP-000427-AU-000040

    <GroupDescription></GroupDescription>
    Group
  • Splunk Enterprise must only allow the use of DOD-approved certificate authorities for cryptographic functions.

    &lt;VulnDiscussion&gt;Untrusted Certificate Authorities (CA) can issue certificates, but they may be issued by organizations or individuals that se...
    Rule Medium Severity
  • SRG-APP-000610-AU-000050

    <GroupDescription></GroupDescription>
    Group
  • Splunk Enterprise must use TLS 1.2 and SHA-2 or higher cryptographic algorithms.

    &lt;VulnDiscussion&gt;Without cryptographic integrity protections, information can be altered by unauthorized users without detection. To protect ...
    Rule High Severity
  • SRG-APP-000141-AU-000090

    <GroupDescription></GroupDescription>
    Group
  • When Splunk Enterprise is distributed over multiple servers, each server must be configured to disable non-essential capabilities.

    &lt;VulnDiscussion&gt;Applications are capable of providing a wide variety of functions and services. Some of the functions and services may not be...
    Rule Medium Severity
  • SRG-APP-000118-AU-000100

    <GroupDescription></GroupDescription>
    Group
  • Splunk Enterprise installation directories must be secured.

    &lt;VulnDiscussion&gt;If audit data were to become compromised, competent forensic analysis and discovery of the true source of potentially malicio...
    Rule Medium Severity
  • SRG-APP-000516-AU-000340

    <GroupDescription></GroupDescription>
    Group
  • Splunk Enterprise forwarders must be configured with Indexer Acknowledgement enabled.

    &lt;VulnDiscussion&gt;To prevent the loss of data during transmission, a handshake acknowledgement between the sender and the recipient may need co...
    Rule Low Severity
  • SRG-APP-000389-AU-000180

    <GroupDescription></GroupDescription>
    Group
  • Splunk Enterprise idle session timeout must be set to not exceed 15 minutes.

    &lt;VulnDiscussion&gt;Without reauthentication, users may access resources or perform tasks for which they do not have authorization. When applica...
    Rule Low Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules