Knowledge Management

Best type of event hashing

imacdonald2
Path Finder

I am looking for the best way to keep an auditor happy that no one has tampered with system event logs, either windows or linux, so if someone went in and changed or deleted the events from an index then we can tell. From my first read it sounds like IT hashes might be the best way. Does anyone have any suggestions or experience.

Tags (1)
0 Karma

jbsplunk
Splunk Employee
Splunk Employee

The answer should be that if you're able to show the auditor some type of hashing that logs changes to files which you're interested in seeing, the requirement is satisfied. That is the approach I have always seen in the past. If an auditor feels that a particular type of auditing is insufficient, they should be able to articulate to you what they'd find to be sufficient, and why the method you're using is faulty. Having worked on different types of compliance standards in the past, in my experience this can vary greatly from organization to organization, or even from different auditors within the same organization.

Get Updates on the Splunk Community!

Splunk Mobile: Your Brand-New Home Screen

Meet Your New Mobile Hub  Hello Splunk Community!  Staying connected to your data—no matter where you are—is ...

Introducing Value Insights (Beta): Understand the Business Impact your organization ...

Real progress on your strategic priorities starts with knowing the business outcomes your teams are delivering ...

Enterprise Security (ES) Essentials 8.3 is Now GA — Smarter Detections, Faster ...

As of today, Enterprise Security (ES) Essentials 8.3 is now generally available, helping SOC teams simplify ...