Ways you can secure Splunk Enterprise
This manual documents some of the many ways to secure your Splunk configuration and describes how to do the following:
- Set up user authentication to create users and manage user access by assigning roles.
- Use SSL to secure communications for your Splunk configuration.
- Use auditing to secure your data.
- Harden your Splunk instances to reduce vulnerability and risk.
User authentication and role-based access control
Set up users and use roles to control access. Splunk Enterprise allows you to configure users in three ways:
- Splunk authentication, described in "Set up user authentication with Splunk's built-in system."
- LDAP, described in "Set up user authentication with LDAP."
- A scripted authentication API for use with an external authentication system, such as PAM or RADIUS, described in "Set up user authentication with external systems."
Once you've configured users you can assign roles that determine and control capabilities and access levels. For more information about roles and capabilities, read "About role-based user access."
Encryption and authentication with SSL
Splunk Enterprise comes with a set of default certificates and keys that, when enabled, provide encryption and data compression. You can also use your own certificates and keys to secure communications between your browser and Splunk Web as well as data sent from forwarders to a receiver, such as an indexer.
Under certain conditions, you can also secure communications in distributed search environments, configuration data sent to clients by a deployment server, and communications from Splunk Web to splunkd.
For more information about securing Splunk communications with SSL, see "About securing Splunk with SSL" in this manual.
Splunk Enterprise includes audit features to allow you to track the reliability of your data. Monitor activities within Splunk Enterprise (such as searches or configuration changes) with audit events, cryptographically sign audit events events with audit event signing, and block sign any data entering your Splunk index with IT data signing.
You can use monitoring to index all
.conffiles using a white list as a best practice, and for user attribution of changes, you can use the file system-based monitoring available out of the box on most Splunk-supported operating systems.
For more information about monitoring, see "Monitor Files and Directories" in the Getting Data In manual.
- Audit events
Watch your Splunk instance by monitoring audit events. Audit events are generated whenever anyone accesses any of your Splunk instances -- including any searches, configuration changes or administrative activities. Each audit event contains information that shows you what changed where and when and who implemented the change. Audit events are especially useful in distributed Splunk configurations for detecting configuration and access control changes across many Splunk Servers.
To learn more, see "Audit Splunk Enterprise activity" in this manual.
- Audit event signing
If you have an Enterprise license, you can configure audit events to be cryptographically signed. Audit event signing adds a sequential number (for detecting gaps in data to reveal tampering), and appends an encrypted hash signature to each audit event. Configure auditing by setting stanzas in audit.conf, and inputs.conf.
To learn more, see "Cyrptographically sign audit events" in this manual.
- Archive signing
You can use archive signing to sign your Splunk data when it gets archived (rolled from cold to frozen). An archive signature is a hash signature of all the data in the archived bucket. Archive signing lets you verify integrity when you restore an archive.
To learn more, see "About archive signing" in this manual.
- Event hashing
Event hashing provides a lightweight way to detect if events have been tampered with between index time and search time. Event hashing is only recommended if you are unable to run the Splunk IT data block signing capabilities.
To learn more, see "Configure event hashing" in this manual.
About securing Splunk Software
This documentation applies to the following versions of Splunk® Enterprise: 5.0, 5.0.1, 5.0.2, 5.0.3, 5.0.4, 5.0.5, 5.0.6, 5.0.7, 5.0.8, 5.0.9, 5.0.10, 5.0.11, 5.0.12, 5.0.13, 5.0.14, 5.0.15, 5.0.16, 5.0.17, 5.0.18, 6.0, 6.0.1, 6.0.2, 6.0.3, 6.0.4, 6.0.5, 6.0.6, 6.0.7, 6.0.8, 6.0.9, 6.0.10, 6.0.11, 6.0.12, 6.0.13, 6.0.14, 6.0.15, 6.1, 6.1.1, 6.1.2, 6.1.3, 6.1.4, 6.1.5, 6.1.6, 6.1.7, 6.1.8, 6.1.9, 6.1.10, 6.1.11, 6.1.12, 6.1.13, 6.1.14