Module 3: User Authentication and Authorisation Flashcards

1
Q

How is Splunk platform secured?

A
  • Role based access - Valid user account with one or more roles is required to access Splunk
  • Single sign-on – integrate with enterprise SSO solutions
  • Auditability – audited events such as searches and conf file changes are indexed in _audit index
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the additional security measures of Splunk?

A
  • Encrypted data flow – data is secured using SSL/TLS (can be disabled)
  • Assurance of data integrity – data can be checked for tampering
  • Authenticated cluster communication – data travelling between Splunk instances are secured through pass4symmkey
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is FIPS mode?

A

FIPS mode (federal information processing standard – FIPS 140-2) – if enabled, Splunk automatically configures all security to comply with US federal government standards. You have to enable FIPS mode before starting Splunk for the first time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A Splunk __ultimately determines what a user can do and cannot do (privileges)

A

role

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Name some examples of capabilities

A
  • Search – lets user perform searches
  • Schedule_search – schedule saved searches, create alerts
  • Edit_sourcetypes – lets user edit sourcetypes
  • Rtsearch – perform real time searches
  • License_edit – edit licenses
  • Admin_all_objects – modify any object in the system
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Name the Splunk built in roles

A
  • Admin – modify all Splunk objects
  • Power – create and edit shared knowledge objects
  • User – create and edit own knowledge objects
  • Can_delete – delete events by keyword
  • Splunk-system-role – special role of system processes
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

You can use the ___command to see capabilities of a particular role

A

btool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the two ways to create and edit a role?

A
  • Splunk web

* Configuration file – authorize.comf

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Why create a custome role?

A
  • Tweak default parameters
  • Flexibility
  • Index security
  • Knowledge objects security
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How do you create a custom role using conf files?

A
  • Authentication.conf = define authentication parameters such as LDAP settings
  • authorize.conf = create new roles and edit capabilities of roles
  • user-prefs.conf = specify the default app for a role, along with other UI specific parameters
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the four authentication mechanisms that are supported?

A

• native
o always on, cannot be disabled
o users can be added, edited and deleted from Splunk web
o users maintained in $SPLUNK_HOME/etc/passwd file
• External LDAP
o most common
o integrates AD
• SAML
o open standard used to assert security info via XML
• Scripted authentication – can use own authentication systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What do you need to know before creating an LDAP strategy?

A
  • LDAP host and port number
  • Bind credentials
  • User base DN and group base DN
  • Username and real-user-name attributes
  • Group name and static member attributes
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are some features of single sign-on?

A
  • No need to type username/password
  • No need to remember/renew passwords
  • Faster login time means better user experience
  • Avoids weak passwords
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

___is required for Single sign on

A

SAML

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Why Multi factor authentication?

A
  • Additional source of validation for improved security
  • Meet compliance/audit requirements such as NIST and GDPR
  • Prevention of security attacks such as DoS
  • Reduce the risk of compromising passwords
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the supported multi-factor integrations?

A
  • Duo security

* RSA security