SV-221932r508660_rule
V-221932
SRG-APP-000427-AU-000040
SPLK-CL-000040
CAT II
10
Request a DoD-approved certificate and a copy of the DoD root CA public certificate and place the files in a location for Splunk use.
Configure the certificate files to the PEM format using the Splunk Enterprise system documentation.
Verify the properties of the certificates used by Splunk to ensure that the Issuer is the DoD trusted CA.
Check the following files for the certificates in use by Splunk.
This file is located on the machine used as the search head, which may be a separate machine in a distributed environment.
$SPLUNK_HOME/etc/system/local/web.conf
[settings]
serverCert = <path to the DoD approved certificate in PEM format>
This file is located on the machine used as an indexer, which may be a separate machine in a distributed environment.
$SPLUNK_HOME/etc/system/local/inputs.conf
[SSL]
serverCert = <path to the DoD approved certificate in PEM format>
This file is located on the machine used as a forwarder, which is always a separate machine regardless of environment.
$SPLUNK_HOME/etc/system/local/outputs.conf
[tcpout:group1]
clientCert = <path to the DoD approved certificate in PEM format>
Verify each certificate listed above with the following command:
openssl x509 -text -inform PEM -in <name of cert>
If the certificate issuer is not a DoD trusted CA, this is a finding.
V-221932
False
SPLK-CL-000040
Verify the properties of the certificates used by Splunk to ensure that the Issuer is the DoD trusted CA.
Check the following files for the certificates in use by Splunk.
This file is located on the machine used as the search head, which may be a separate machine in a distributed environment.
$SPLUNK_HOME/etc/system/local/web.conf
[settings]
serverCert = <path to the DoD approved certificate in PEM format>
This file is located on the machine used as an indexer, which may be a separate machine in a distributed environment.
$SPLUNK_HOME/etc/system/local/inputs.conf
[SSL]
serverCert = <path to the DoD approved certificate in PEM format>
This file is located on the machine used as a forwarder, which is always a separate machine regardless of environment.
$SPLUNK_HOME/etc/system/local/outputs.conf
[tcpout:group1]
clientCert = <path to the DoD approved certificate in PEM format>
Verify each certificate listed above with the following command:
openssl x509 -text -inform PEM -in <name of cert>
If the certificate issuer is not a DoD trusted CA, this is a finding.
M
4082