Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-221626 | SPLK-CL-000300 | SV-221626r961401_rule | Low |
Description |
---|
It is critical for the appropriate personnel to be aware if a system is at risk of failing to process audit logs as required. Without a real-time alert, security personnel may be unaware of an impending failure of the audit function and application operation may be adversely affected. |
STIG | Date |
---|---|
Splunk Enterprise 7.x for Windows Security Technical Implementation Guide | 2024-06-10 |
Check Text ( C-23341r416335_chk ) |
---|
If the Splunk instance is used for Tier 2 CSSP (formerly CND-SP) or JRSS analysis, this check is N/A. Interview the SA to verify that a process exists to notify the SA and ISSO of any audit failure, such as loss of communication or logs no longer being collected. Interview the ISSO to confirm receipt of this notification. If a report does not exist to notify the SA and ISSO of audit failure events, or the ISSO does not confirm receipt of the report, this is a finding. |
Fix Text (F-23330r416336_fix) |
---|
If the Splunk instance is used for Tier 2 CSSP (formerly CND-SP) or JRSS analysis, this fix is N/A. Configure Splunk Enterprise using the reporting and notification tools to create a report with notification to the SA and ISSO of any audit failure events, such as loss of communication or logs no longer being collected. |