Security

What metrics to monitor for Meltdown and Spectre

iKickFish
Explorer

I realize that these are both hardware vulnerabilities but wanted to know. out of the data we are able to collect with splunk, what specific metrics would be the best to monitor as they directly correlate to Meltdown and Spectre behavior? From what I have been reading from the white papers, it's extremely difficult/ impossible to determine if this attack has been executed in your environment.

Any insight or recommendations are greatly appreciated.

-iKF

0 Karma
1 Solution

Esky73
Builder

depends on what you currently have with Splunk ? are you ingesting from vulnerability management tools ?

If you have Splunk ES you could use that to look for the vunerabilities as per this article here :

https://www.linkedin.com/pulse/splunking-apache-struts-vulnerabilities-exploits-love-ken-westin/

Spectre:

CVE-2017-5753: bounds check bypass

CVE-2017-5715: branch target injection

Meltdown:

CVE-2017-5754: rogue data cache load

So something like ..

tag=vulnerability (cve=" CVE-2017-5753" OR cve=" CVE-2017-5715" OR cve=" CVE-2017-5754")
| table src cve pluginName first_found last_found last_fixed
| dedup src
| fillnull value=NOT_FIXED last_fixed
| search last_fixed=NOT_FIXED
| stats count as total

View solution in original post

Esky73
Builder

depends on what you currently have with Splunk ? are you ingesting from vulnerability management tools ?

If you have Splunk ES you could use that to look for the vunerabilities as per this article here :

https://www.linkedin.com/pulse/splunking-apache-struts-vulnerabilities-exploits-love-ken-westin/

Spectre:

CVE-2017-5753: bounds check bypass

CVE-2017-5715: branch target injection

Meltdown:

CVE-2017-5754: rogue data cache load

So something like ..

tag=vulnerability (cve=" CVE-2017-5753" OR cve=" CVE-2017-5715" OR cve=" CVE-2017-5754")
| table src cve pluginName first_found last_found last_fixed
| dedup src
| fillnull value=NOT_FIXED last_fixed
| search last_fixed=NOT_FIXED
| stats count as total

iKickFish
Explorer

Excellent, Thank you so much!

0 Karma
Get Updates on the Splunk Community!

Splunk Observability as Code: From Zero to Dashboard

For the details on what Self-Service Observability and Observability as Code is, we have some awesome content ...

[Puzzles] Solve, Learn, Repeat: Character substitutions with Regular Expressions

This challenge was first posted on Slack #puzzles channelFor BORE at .conf23, we had a puzzle question which ...

Shape the Future of Splunk: Join the Product Research Lab!

Join the Splunk Product Research Lab and connect with us in the Slack channel #product-research-lab to get ...