Knowledge Management

Best type of event hashing

imacdonald2
Path Finder

I am looking for the best way to keep an auditor happy that no one has tampered with system event logs, either windows or linux, so if someone went in and changed or deleted the events from an index then we can tell. From my first read it sounds like IT hashes might be the best way. Does anyone have any suggestions or experience.

Tags (1)
0 Karma

jbsplunk
Splunk Employee
Splunk Employee

The answer should be that if you're able to show the auditor some type of hashing that logs changes to files which you're interested in seeing, the requirement is satisfied. That is the approach I have always seen in the past. If an auditor feels that a particular type of auditing is insufficient, they should be able to articulate to you what they'd find to be sufficient, and why the method you're using is faulty. Having worked on different types of compliance standards in the past, in my experience this can vary greatly from organization to organization, or even from different auditors within the same organization.

Get Updates on the Splunk Community!

Accelerating Observability as Code with the Splunk AI Assistant

We’ve seen in previous posts what Observability as Code (OaC) is and how it’s now essential for managing ...

Integrating Splunk Search API and Quarto to Create Reproducible Investigation ...

 Splunk is More Than Just the Web Console For Digital Forensics and Incident Response (DFIR) practitioners, ...

Congratulations to the 2025-2026 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...