Splunk abhijay

434 views

Published on

Published in: Technology, Business
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
434
On SlideShare
0
From Embeds
0
Number of Embeds
3
Actions
Shares
0
Downloads
23
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • Splunk CLI is the subsystem that consists of the Command-Line Interface. It has the same functionality as the Splunk Web subsystem except for visual presentation functionality, such as dashboards, charts, graphs, and typeahead. A user uses this subsystem by navigating the operating system‘s standard command-line interface to the folder in which the ―splunk‖ process resides. The user then issues the command ―splunk‖ to run the executable, but also adds the action the user wishes to perform as command-line arguments.
  • A legitimate user of the TOE could gain unauthorized access to resources or information protected by the TOE, or performs operations for which no access rights have been granted, via user error, system error, or other actions. An administrator may incorrectly install or configure the TOE, or install a corrupted TOE resulting in ineffective security mechanisms. A malicious user or process may view audit records and/or IT data, cause the records or information to be lost or modified, or prevent future audit records and IT data from being recorded, thus masking a user‘s action
  • A.ADMIN admins are assgined to install configure toeThe security features offered by the Operational Environment protect the files used by the TOE. The TOE will be located within controlled access facilities that will prevent unauthorized physical access
  • The TOE will provide measures to authorize users to access specified TOE resources once the user has been authenticated. User authorization is based on access rights configured by the authorized users of the TOE. The TOE will provide measures for determining security alerts when audit data or IT records that represent any of these alerts is recorded. The TOE‘s operating environment must satisfy the following objectives. OE.ADMIN One or more authorized administrators will The security features offered by the Operational Environment will protect the files used by the TOE.
  • Each IT data event has at least the date/time of the event, source, source type, and host name. Only authorized users are able to read the indexed IT data by performing searches on the TOE The TOE collects audit logs on TOE startup and shutdown, user login, and any user action on the system, including editing users and configuration The TOE utilizes OpenSSL packages to generate cryptographic keys utilizing the RSA algorithm with 1024-bit keys. The TOE will overwrite old keys whenever a new key is generated TOE utilizes an RBAC Policy which requires roles to be assigned to users to perform anything but the most basic functions of the TOE
  • Splunk abhijay

    1. 1. Splunk<br />
    2. 2. ST Identification<br /> ST Title: Splunk Inc. Splunk 4.1.7 Security Target<br />ST Version: 2.0<br />ST Publication Date: February 1, 2011<br />ST Author: Booz Allen Hamilton<br />
    3. 3. Scope<br />
    4. 4. Security Target Introduction<br />
    5. 5. CC Concepts<br />
    6. 6.
    7. 7.
    8. 8. Security Problem<br />
    9. 9. Threats<br />
    10. 10. Assumptions<br />
    11. 11. Security Objectives<br />IT Security Objectives<br />O.ACCESS <br />O.ALERT <br />O.AUDIT <br />operational environment<br /> OE.ADMIN <br />OE.AUDIT <br />OE.FILESYS <br />
    12. 12. TOE Security Functions <br />IT Data Indexing <br />Security Audit <br />Cryptographic Support <br />User Data Protection <br />Identification and Authentication <br />
    13. 13. THANK YOU<br />

    ×