Insecure Authentication Attempts
This reports looks at attempts to access cardholder systems using insecure protocols and services. Use this report to identify the source of the insecure authentication attempts so they can be evaluated and eliminated if they pose a risk to the cardholder system.
If remote administration is not done with secure authentication and encrypted communications, sensitive administrative or operational level information like administrator passwords could be revealed to an eavesdropper. PCI DSS requires that you use only secure technologies to log into cardholder systems.
Relevant data sources
Relevant data sources for this report include any device that produces clear text or other insecure authentication activity, such as Windows Security, telnet, and others.
How to configure this report
- Index authentication data from a device, application, or system in Splunk platform.
- Map the data to the following Common Information Model fields:
host, action, app, src, src_user, dest, user
. CIM-compliant add-ons for these data sources perform this step for you. - Tag authentication messages that pass credentials in the clear or are considered insecure with either "cleartext" or "insecure".
Report description
The data in the Insecure Authentication Attempts report is populated by the Authentication data model.
Useful searches for troubleshooting
Troubleshooting Task | Search/Action | Expected Result |
---|---|---|
Verify that authentication data is returned. | tag=authentication or `authentication` |
Returns all authentication activity data from your network device(s). |
Verify that clear text authentication attempts are returned. | tag=cleartext tag=insecure | Returns all clear text authentication data. |
Verify that insecure authentication attempts are returned. | tag=authentication tag=insecure | Returns all insecure authentication attempts. |
Verify that all insecure and clear text authentication data is normalized to the Common Information Model properly. | `authentication` | tags outputfield=tag | table _time,host,action,app,src,src_user,dest,user,tag | Returns a table of the authentication fields. |
Additional information
Windows login events with LoginType=8
are often seen in this report. These login events are clear text login attempts. Other examples include telnet login events, rsh, rexec, and so on.
Default Account Access | PCI System Inventory |
This documentation applies to the following versions of Splunk® App for PCI Compliance: 5.0.0
Feedback submitted, thanks!