Skip to content

II - Mission Support Sensitive

Rules and Groups employed by this XCCDF Profile

  • Splunk Enterprise must be configured to retain the identity of the original source host or device where the event occurred as part of the log record.

    <VulnDiscussion>In this case the information producer is the device based on IP address or some other identifier of the device producing the ...
    Rule Medium Severity
  • SRG-APP-000516-AU-000340

    <GroupDescription></GroupDescription>
    Group
  • Splunk Enterprise must use TCP for data transmission.

    &lt;VulnDiscussion&gt;If the UDP protocol is used for communication, then data packets that do not reach the server are not detected as a data loss...
    Rule Medium Severity
  • SRG-APP-000516-AU-000350

    <GroupDescription></GroupDescription>
    Group
  • Splunk Enterprise must be configured with a report to notify the System Administrator (SA) and Information System Security Officer (ISSO), at a minimum, when an attack is detected on multiple devices and hosts within its scope of coverage.

    &lt;VulnDiscussion&gt;Detecting when multiple systems are showing anomalies can often indicate an attack. Notifying appropriate personnel can initi...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules