III - Administrative Public
Rules and Groups employed by this XCCDF Profile
-
SRG-APP-000295-AU-000190
<GroupDescription></GroupDescription>Group -
Splunk Enterprise idle session timeout must be set to not exceed 15 minutes.
<VulnDiscussion>Automatic session termination after a period of inactivity addresses the potential for a malicious actor to exploit the unatt...Rule Medium Severity -
SRG-APP-000291-AU-000200
<GroupDescription></GroupDescription>Group -
Splunk Enterprise must notify the system administrator (SA) and information system security officer (ISSO) when account events are received (creation, deletion, modification, or disabling).
<VulnDiscussion>Once an attacker establishes access to an application, the attacker often attempts to create a persistent method of re-establ...Rule Low Severity -
SRG-APP-000065-AU-000240
<GroupDescription></GroupDescription>Group -
Splunk Enterprise must enforce the limit of three consecutive invalid logon attempts by a user during a 15-minute time period.
<VulnDiscussion>By limiting the number of failed login attempts, the risk of unauthorized system access via user password guessing, otherwise...Rule Medium Severity -
SRG-APP-000345-AU-000400
<GroupDescription></GroupDescription>Group -
Splunk Enterprise must automatically lock the account until the locked account is released by an administrator when three unsuccessful login attempts in 15 minutes are exceeded.
<VulnDiscussion>By limiting the number of failed login attempts, the risk of unauthorized system access via user password guessing, otherwise...Rule Medium Severity -
SRG-APP-000068-AU-000035
<GroupDescription></GroupDescription>Group -
Splunk Enterprise must display the Standard Mandatory DOD Notice and Consent Banner before granting access to the server.
<VulnDiscussion>Display of the DOD-approved use notification before granting access to the application ensures privacy and security notificat...Rule Low Severity -
SRG-APP-000080-AU-000010
<GroupDescription></GroupDescription>Group -
Splunk Enterprise must be configured to protect the log data stored in the indexes from alteration.
<VulnDiscussion>Without non-repudiation, it is impossible to positively attribute an action to an individual (or process acting on behalf of ...Rule Medium Severity -
SRG-APP-000086-AU-000020
<GroupDescription></GroupDescription>Group -
Splunk Enterprise must be configured to aggregate log records from organization-defined devices and hosts within its scope of coverage.
<VulnDiscussion>If the application is not configured to collate records based on the time when the events occurred, the ability to perform fo...Rule Low Severity -
SRG-APP-000086-AU-000390
<GroupDescription></GroupDescription>Group -
In a distributed environment, Splunk Enterprise indexers must be configured to ingest log records from its forwarders.
<VulnDiscussion>Log servers (e.g., syslog servers) are often used on network segments to consolidate from the devices and hosts on that netwo...Rule Medium Severity -
SRG-APP-000095-AU-000050
<GroupDescription></GroupDescription>Group -
The System Administrator (SA) and Information System Security Manager (ISSM) must configure the retention of the log records based on the defined security plan.
<VulnDiscussion>If authorized individuals do not have the ability to modify auditing parameters in response to a changing threat environment,...Rule Low Severity -
SRG-APP-000089-AU-000400
<GroupDescription></GroupDescription>Group -
Splunk Enterprise must be configured to retain the DoD-defined attributes of the log records sent by the devices and hosts.
<VulnDiscussion>Log records can be generated from various components within the application (e.g., process, module). Certain specific applica...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.