Splunk User Behavior Analytics (UBA) Owner's Manual
Splunk User Behavior Analytics (UBA) uses machine learning techniques to detect insider security threats and advance security attacks against a business and its IT infrastructure. These types of threats are very difficult to detect by other means.
Like any complex system, UBA requires regular maintenance for it to function optimally. Just as a car needs its oil changed regularly, UBA requires a specific set of tasks to be performed at regular intervals. The responsibility for performing these tasks rests with the owner of the individual implementation of Splunk UBA. This may be a team of people or a single individual. This manual describes the recommended ongoing maintenance tasks that the owner of a Splunk UBA implementation should ensure are performed to keep their implementation functional.
How to use this owner’s manual
Each task has a recommended schedule. The recommended frequency for a task can be anywhere from weekly to annually.
This manual does not require a deep understanding of Splunk UBA to follow, and the procedures are detailed in a manner that they should be able to be performed by anyone with a moderate technical understanding of IT systems and general domain knowledge in cyber security.
Maintenance schedule
These procedures are valid as of UBA version 5.3.0.
Tasks
- Anomaly rule tuning. This activity involves assessing the output of the Splunk UBA anomaly models and identifying anomalies that are either inaccurate or irrelevant to the customer organization.
- Sizing adherence checks. This activity assesses the current adherence to the UBA sizing guidelines for the UBA cluster and determines if a resize of the cluster is needed.
- OS security patching. This activity covers the application of OS security patches to a UBA cluster as per Splunk best practices.
- Back-up file directory cleanup. This task cleans out the backup directory of the UBA cluster to ensure that the incremental UBA backups do not fill up the node disk and subsequently compromise cluster functionality.
- Data source integrity validation. This activity analyzes each data input for Splunk UBA to ensure the integrity of the log data being ingested and the overall health of the input process itself.
Schedule
The following schedule describes the time intervals that the provided maintenance procedures are recommended to be performed at.
Task | This task is performed at least every: | Expected duration: |
---|---|---|
Anomaly rule tuning | Two weeks | 45 minutes |
Sizing adherence checks | Three months | 30 minutes |
OS security patching | Six months (see procedure notes for exceptions) | 30 minutes |
Back-up file directory cleanup | Month | 15 minutes |
Data source integrity validation | Week | 45 minutes |