<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Can splunk be 100% CIM Compliance? in Splunk Enterprise Security</title>
    <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Can-splunk-be-100-CIM-Compliance/m-p/483157#M7830</link>
    <description>&lt;P&gt;I doubt you will ever see 100% CIM compliance.  That would require every event to contain every CIM field for a given datamodel and that just doesn't happen, IME.  I'm not saying it isn't possible, but it's probably impractical.  I'd be very happy with 80% compliance, TBH.&lt;/P&gt;</description>
    <pubDate>Tue, 14 Jan 2020 21:40:53 GMT</pubDate>
    <dc:creator>richgalloway</dc:creator>
    <dc:date>2020-01-14T21:40:53Z</dc:date>
    <item>
      <title>Can splunk be 100% CIM Compliance?</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Can-splunk-be-100-CIM-Compliance/m-p/483156#M7829</link>
      <description>&lt;P&gt;My team is always complainin that splunk is not cim compliance. Most of data sources in splunk such as symantec endpoint and bluecoat logs are not completely cim compliance. They are 80% cim compliance. My question is can splunk ever be 100%cim compliance or am I trying to do something that cant be achieved.&lt;/P&gt;</description>
      <pubDate>Tue, 14 Jan 2020 20:17:41 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Can-splunk-be-100-CIM-Compliance/m-p/483156#M7829</guid>
      <dc:creator>ujuka</dc:creator>
      <dc:date>2020-01-14T20:17:41Z</dc:date>
    </item>
    <item>
      <title>Re: Can splunk be 100% CIM Compliance?</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Can-splunk-be-100-CIM-Compliance/m-p/483157#M7830</link>
      <description>&lt;P&gt;I doubt you will ever see 100% CIM compliance.  That would require every event to contain every CIM field for a given datamodel and that just doesn't happen, IME.  I'm not saying it isn't possible, but it's probably impractical.  I'd be very happy with 80% compliance, TBH.&lt;/P&gt;</description>
      <pubDate>Tue, 14 Jan 2020 21:40:53 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Can-splunk-be-100-CIM-Compliance/m-p/483157#M7830</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2020-01-14T21:40:53Z</dc:date>
    </item>
    <item>
      <title>Re: Can splunk be 100% CIM Compliance?</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Can-splunk-be-100-CIM-Compliance/m-p/483158#M7831</link>
      <description>&lt;P&gt;I'm one of the founders of Enterprise Security (which was a big driver in the CIM, which I also helped develop) and I completely agree that CIM compliance in the way that your coworkers are describing is flawed.&lt;/P&gt;

&lt;P&gt;Here are some observations:&lt;/P&gt;

&lt;OL&gt;
&lt;LI&gt;The main point of CIM compliance is to enable use-cases and help you solve problems. The question ought to be less "what is the rate of CIM compliance?", &lt;STRONG&gt;the question should rather be "what use-cases can I &lt;EM&gt;not&lt;/EM&gt; do as a result of logs that don't match the CIM?"&lt;/STRONG&gt;. Conversely, you could even have high compliance while missing key use-cases (e.g. "I have 99% compliance but I just so happen to ignore those log messages that say my firewall is failing").&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;The CIM doesn't have models for every conceivable type of data, it was never meant to cover absolutely everything.&lt;/STRONG&gt; This is why the CIM is updated with new models every once in a while.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Some logs are extremely complicated to parse consistently because they include several formats.&lt;/STRONG&gt; Consider Unix logs which may have many, many sources and several formats. 100% coverage would be unrealistic.&lt;/LI&gt;
&lt;LI&gt;CIM compliance often follows the Pareto Principle in that the first 80% of the data takes 20% of the effort. The last 20% will likely be as hard if not harder than the first 80%. &lt;STRONG&gt;One needs to consider the real value of that 20% before determining if it is worth spending the time to get them compliant. It likely isn't worth the effort&lt;/STRONG&gt; (assuming it can even be done).&lt;/LI&gt;
&lt;/OL&gt;</description>
      <pubDate>Tue, 14 Jan 2020 22:48:35 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Can-splunk-be-100-CIM-Compliance/m-p/483158#M7831</guid>
      <dc:creator>LukeMurphey</dc:creator>
      <dc:date>2020-01-14T22:48:35Z</dc:date>
    </item>
    <item>
      <title>Re: Can splunk be 100% CIM Compliance?</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Can-splunk-be-100-CIM-Compliance/m-p/483159#M7832</link>
      <description>&lt;P&gt;Hi Luke,&lt;BR /&gt;
 Thanks for answering the question. Hope this would explain the team to drive the percentage of CIM Compliance with use cases. &lt;/P&gt;

&lt;P&gt;Thank You,&lt;BR /&gt;
Ujuka&lt;/P&gt;</description>
      <pubDate>Wed, 15 Jan 2020 13:52:10 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Can-splunk-be-100-CIM-Compliance/m-p/483159#M7832</guid>
      <dc:creator>ujuka</dc:creator>
      <dc:date>2020-01-15T13:52:10Z</dc:date>
    </item>
  </channel>
</rss>

