<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: What metrics to monitor for Meltdown and Spectre in Security</title>
    <link>https://community.splunk.com/t5/Security/What-metrics-to-monitor-for-Meltdown-and-Spectre/m-p/290337#M7755</link>
    <description>&lt;P&gt;depends on what you currently have with Splunk ? are you ingesting from vulnerability management tools ?&lt;/P&gt;

&lt;P&gt;If you have Splunk ES you could use that to look for the vunerabilities as per this article here :&lt;/P&gt;

&lt;P&gt;&lt;A href="https://www.linkedin.com/pulse/splunking-apache-struts-vulnerabilities-exploits-love-ken-westin/" target="_blank"&gt;https://www.linkedin.com/pulse/splunking-apache-struts-vulnerabilities-exploits-love-ken-westin/&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;Spectre:&lt;/P&gt;

&lt;P&gt;CVE-2017-5753: bounds check bypass&lt;/P&gt;

&lt;P&gt;CVE-2017-5715: branch target injection&lt;/P&gt;

&lt;P&gt;Meltdown:&lt;/P&gt;

&lt;P&gt;CVE-2017-5754: rogue data cache load&lt;/P&gt;

&lt;P&gt;So something like ..&lt;/P&gt;

&lt;P&gt;tag=vulnerability (cve=" CVE-2017-5753" OR cve=" CVE-2017-5715" OR cve=" CVE-2017-5754") &lt;BR /&gt;
| table src cve pluginName first_found last_found last_fixed &lt;BR /&gt;
| dedup src &lt;BR /&gt;
| fillnull value=NOT_FIXED last_fixed &lt;BR /&gt;
| search last_fixed=NOT_FIXED &lt;BR /&gt;
| stats count as total&lt;/P&gt;</description>
    <pubDate>Tue, 29 Sep 2020 17:31:09 GMT</pubDate>
    <dc:creator>Esky73</dc:creator>
    <dc:date>2020-09-29T17:31:09Z</dc:date>
    <item>
      <title>What metrics to monitor for Meltdown and Spectre</title>
      <link>https://community.splunk.com/t5/Security/What-metrics-to-monitor-for-Meltdown-and-Spectre/m-p/290336#M7754</link>
      <description>&lt;P&gt;I realize that these are both hardware vulnerabilities but wanted to know. out of the data we are able to collect with splunk, what specific metrics would be the best to monitor as they directly correlate to Meltdown and Spectre behavior? From what I have been reading from the white papers, it's extremely difficult/ impossible to determine if this attack has been executed in your environment.&lt;/P&gt;

&lt;P&gt;Any insight or recommendations are greatly appreciated.&lt;/P&gt;

&lt;P&gt;-iKF&lt;/P&gt;</description>
      <pubDate>Mon, 08 Jan 2018 12:11:08 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/What-metrics-to-monitor-for-Meltdown-and-Spectre/m-p/290336#M7754</guid>
      <dc:creator>iKickFish</dc:creator>
      <dc:date>2018-01-08T12:11:08Z</dc:date>
    </item>
    <item>
      <title>Re: What metrics to monitor for Meltdown and Spectre</title>
      <link>https://community.splunk.com/t5/Security/What-metrics-to-monitor-for-Meltdown-and-Spectre/m-p/290337#M7755</link>
      <description>&lt;P&gt;depends on what you currently have with Splunk ? are you ingesting from vulnerability management tools ?&lt;/P&gt;

&lt;P&gt;If you have Splunk ES you could use that to look for the vunerabilities as per this article here :&lt;/P&gt;

&lt;P&gt;&lt;A href="https://www.linkedin.com/pulse/splunking-apache-struts-vulnerabilities-exploits-love-ken-westin/" target="_blank"&gt;https://www.linkedin.com/pulse/splunking-apache-struts-vulnerabilities-exploits-love-ken-westin/&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;Spectre:&lt;/P&gt;

&lt;P&gt;CVE-2017-5753: bounds check bypass&lt;/P&gt;

&lt;P&gt;CVE-2017-5715: branch target injection&lt;/P&gt;

&lt;P&gt;Meltdown:&lt;/P&gt;

&lt;P&gt;CVE-2017-5754: rogue data cache load&lt;/P&gt;

&lt;P&gt;So something like ..&lt;/P&gt;

&lt;P&gt;tag=vulnerability (cve=" CVE-2017-5753" OR cve=" CVE-2017-5715" OR cve=" CVE-2017-5754") &lt;BR /&gt;
| table src cve pluginName first_found last_found last_fixed &lt;BR /&gt;
| dedup src &lt;BR /&gt;
| fillnull value=NOT_FIXED last_fixed &lt;BR /&gt;
| search last_fixed=NOT_FIXED &lt;BR /&gt;
| stats count as total&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 17:31:09 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/What-metrics-to-monitor-for-Meltdown-and-Spectre/m-p/290337#M7755</guid>
      <dc:creator>Esky73</dc:creator>
      <dc:date>2020-09-29T17:31:09Z</dc:date>
    </item>
    <item>
      <title>Re: What metrics to monitor for Meltdown and Spectre</title>
      <link>https://community.splunk.com/t5/Security/What-metrics-to-monitor-for-Meltdown-and-Spectre/m-p/290338#M7756</link>
      <description>&lt;P&gt;Excellent, Thank you so much!&lt;/P&gt;</description>
      <pubDate>Tue, 09 Jan 2018 12:21:52 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/What-metrics-to-monitor-for-Meltdown-and-Spectre/m-p/290338#M7756</guid>
      <dc:creator>iKickFish</dc:creator>
      <dc:date>2018-01-09T12:21:52Z</dc:date>
    </item>
  </channel>
</rss>

