Knowledge Management

Best type of event hashing

imacdonald2
Path Finder

I am looking for the best way to keep an auditor happy that no one has tampered with system event logs, either windows or linux, so if someone went in and changed or deleted the events from an index then we can tell. From my first read it sounds like IT hashes might be the best way. Does anyone have any suggestions or experience.

Tags (1)
0 Karma

jbsplunk
Splunk Employee
Splunk Employee

The answer should be that if you're able to show the auditor some type of hashing that logs changes to files which you're interested in seeing, the requirement is satisfied. That is the approach I have always seen in the past. If an auditor feels that a particular type of auditing is insufficient, they should be able to articulate to you what they'd find to be sufficient, and why the method you're using is faulty. Having worked on different types of compliance standards in the past, in my experience this can vary greatly from organization to organization, or even from different auditors within the same organization.

Get Updates on the Splunk Community!

Splunk Observability for AI

Don’t miss out on an exciting Tech Talk on Splunk Observability for AI!Discover how Splunk’s agentic AI ...

Splunk Enterprise Security 8.x: The Essential Upgrade for Threat Detection, ...

Watch On Demand the Tech Talk, and empower your SOC to reach new heights! Duration: 1 hour  Prepare to ...

Splunk Observability as Code: From Zero to Dashboard

For the details on what Self-Service Observability and Observability as Code is, we have some awesome content ...