<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Controls over data integrity in Security</title>
    <link>https://community.splunk.com/t5/Security/Controls-over-data-integrity/m-p/34201#M1142</link>
    <description>&lt;P&gt;Thanks, it kind of answers the question, however I'm not sure how well this works, e.g. if someone was able to replicate the same settings (if they have compromised the server, then chances are they can read the conf files) on their Splunk instance before copying index buckets. Maybe its just something I need to test out. But I was wondering if there was a conclusive answer.&lt;/P&gt;</description>
    <pubDate>Wed, 14 Aug 2013 09:50:52 GMT</pubDate>
    <dc:creator>MHibbin</dc:creator>
    <dc:date>2013-08-14T09:50:52Z</dc:date>
    <item>
      <title>Controls over data integrity</title>
      <link>https://community.splunk.com/t5/Security/Controls-over-data-integrity/m-p/34199#M1140</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;

&lt;P&gt;I just had a thought, not really looked into to much (work commitments) so I thought I would ask the (Splunk) world, however, apologies if this is something documented...&lt;/P&gt;

&lt;P&gt;Are there any controls over data being falsely inserted into the index through a replication of buckets?&lt;/P&gt;

&lt;P&gt;To expand on this a little, if someone wanted to skew results, they could potentially copy buckets from there own indexes to a production instance and rebuild the production indexes. Obviously, access controls would be the big factor here in protection and potentially auditing of the indexes, but are there any controls in place from Splunk's point of view?&lt;/P&gt;

&lt;P&gt;Thanks,&lt;/P&gt;

&lt;P&gt;Matt&lt;/P&gt;</description>
      <pubDate>Wed, 14 Aug 2013 08:46:03 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Controls-over-data-integrity/m-p/34199#M1140</guid>
      <dc:creator>MHibbin</dc:creator>
      <dc:date>2013-08-14T08:46:03Z</dc:date>
    </item>
    <item>
      <title>Re: Controls over data integrity</title>
      <link>https://community.splunk.com/t5/Security/Controls-over-data-integrity/m-p/34200#M1141</link>
      <description>&lt;P&gt;Did you read the docs?&lt;BR /&gt;
&lt;A href="http://docs.splunk.com/Documentation/Splunk/latest/Security/"&gt;http://docs.splunk.com/Documentation/Splunk/latest/Security/&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;&lt;A href="http://wiki.splunk.com/Community:DeployHardenedSplunk"&gt;http://wiki.splunk.com/Community:DeployHardenedSplunk&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;and this;&lt;/P&gt;

&lt;P&gt;&lt;A href="http://docs.splunk.com/Documentation/ES/2.4/Install/Configuredataprotection"&gt;http://docs.splunk.com/Documentation/ES/2.4/Install/Configuredataprotection&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;or it did not answer your question ?&lt;/P&gt;</description>
      <pubDate>Wed, 14 Aug 2013 09:26:31 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Controls-over-data-integrity/m-p/34200#M1141</guid>
      <dc:creator>lmyrefelt</dc:creator>
      <dc:date>2013-08-14T09:26:31Z</dc:date>
    </item>
    <item>
      <title>Re: Controls over data integrity</title>
      <link>https://community.splunk.com/t5/Security/Controls-over-data-integrity/m-p/34201#M1142</link>
      <description>&lt;P&gt;Thanks, it kind of answers the question, however I'm not sure how well this works, e.g. if someone was able to replicate the same settings (if they have compromised the server, then chances are they can read the conf files) on their Splunk instance before copying index buckets. Maybe its just something I need to test out. But I was wondering if there was a conclusive answer.&lt;/P&gt;</description>
      <pubDate>Wed, 14 Aug 2013 09:50:52 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Controls-over-data-integrity/m-p/34201#M1142</guid>
      <dc:creator>MHibbin</dc:creator>
      <dc:date>2013-08-14T09:50:52Z</dc:date>
    </item>
    <item>
      <title>Re: Controls over data integrity</title>
      <link>https://community.splunk.com/t5/Security/Controls-over-data-integrity/m-p/34202#M1143</link>
      <description>&lt;P&gt;(in these times, with the right resources, time and mindset - everything is possible) &lt;BR /&gt;
My guess is that it comes down to how the certificates and how the actual signing / hashning of the events written to disk is handled (i.e what combination of for exemple host/mac-address/password/cert to generate ). Hopefully some developer could share some insight ... ? &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 14 Aug 2013 10:43:56 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Controls-over-data-integrity/m-p/34202#M1143</guid>
      <dc:creator>lmyrefelt</dc:creator>
      <dc:date>2013-08-14T10:43:56Z</dc:date>
    </item>
    <item>
      <title>Re: Controls over data integrity</title>
      <link>https://community.splunk.com/t5/Security/Controls-over-data-integrity/m-p/34203#M1144</link>
      <description>&lt;P&gt;Agreed, thanks for the valued input! &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 14 Aug 2013 12:18:06 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Controls-over-data-integrity/m-p/34203#M1144</guid>
      <dc:creator>MHibbin</dc:creator>
      <dc:date>2013-08-14T12:18:06Z</dc:date>
    </item>
  </channel>
</rss>

