Using a security data onboarding maturity model
A common security data workflow for any company is to recognize that they have data, ingest the data into their software, and then maybe find a use case for the data six months later. The thought process here is that all data is valuable, but in reality, this process creates more problems than it solves. This goal-less ingestion creates a data graveyard where paying to store unnecessary data not only wastes resources, but leads to data onboarding fatigue with endless updates and maintenance, rather than delivering value.
You want to have a better process for your organization.
Solution
Follow this beginner-friendly onboarding process with achievable, simple, and repeatable goals.
Level 1: Ingested and searchable
The data is in the Splunk platform, we can find it, and the right people have access. In level one, you work on the following:
| Data is searchable | Relevant access controls | Basic documentation |
|---|---|---|
|
Make sure the following are correct:
|
|
Level 2: Compliance and coverage
The data is usable and has a purpose. In level two, you work on the following:
| CIM compliant enough | Mapped to use cases | Know your "physical" coverage |
|---|---|---|
|
|
|
Level 3: Assured and enriched
The data is reliable, being used to enrich other information inside your platform, and context-aware, meaning it is tailored toward your security use cases. In level three, you work on the following:
| Feed service alerts | Enrichment | Tailored |
|---|---|---|
|
|
|
Level 4: Actively managed
The data drives strategy and action. You shouldn't be simply reacting to fulfill any service request. In level four, you work on the following:
| Data source review | Use case driven onboarding | Automated onboarding |
|---|---|---|
|
Threats and technologies change over time. At least once a year you should be reviewing your data onboarding with the following questions in mind:
|
|
|
Next steps
Now that you have a solid data onboarding process to follow, watch the full .conf25, From request to response: Mastering security data onboarding. In the talk, you'll learn about specific steps you can take to mature your data onboarding practice.
- Splunk Community: Best practices for defining source types
- Splunk Lantern: Identifying high-value assets and data sources
- Splunk Lantern: Managing data models in Enterprise Security
- Splunk Lantern: Implementing role-based access control
- Splunk Lantern: Naming conventions
- Splunk Lantern: Complying with the Splunk Common Information model

