Skip to main content

 

Splunk Lantern

Selecting security use cases for the Splunk platform

 

A variety of effective security use cases that only require the core Splunk platform can be found in the Splunk Security Essentials app and in the use cases linked to in this article.

Security monitoring

Security monitoring processes enable you to analyze a continuous stream of near-real-time data for threats and other potential security issues. Data sources for monitoring include network and endpoint systems, as well as cloud devices, data center systems, and applications. The Splunk platform enables security teams to detect and prioritize threats found in the stream of data from these sources:

Incident Management

Security incidents can occur without warning and can often go undetected long enough to pose a serious threat to an organization. Usually, by the time security teams are aware of an issue, there’s a good chance the damage has been done. Splunk software provides security teams with a “single source of truth” for all time-stamped machine data in a computing environment. This helps them drive better and faster security investigations, reducing the chance of a threat going undetected for extended periods.

Compliance

In nearly all environments, there are regulatory requirements in one form or another – especially when dealing with GDPR, HIPAA, PCI, SOX and even common guidelines that aren’t considered true compliance, such as the 20 CIS Critical Security Controls. Organizations need to stay ahead of ever-evolving regulations, policies, and business risks while reducing time, errors, and costs with an analytics-driven, proactive approach to compliance. There are many ways of solving compliance challenges using Splunk solutions. 

Visualizations and Reporting

A well-configured visualization or report should allow you to view threats and incidents that are trending up or down. You should be able to produce and show current results and trends in order to review incidents, assess your security posture, and make better decisions. Viewing trends through a single pane of glass is a powerful tool for both analysts and managers, helping to reduce dwell and resolution times and providing real-time insights.

Anomaly detection

Tools that analyze behavior on your network and use machine learning to find anomalies in that behavior can notify you of potential threats. Where it could take a human days or weeks to find anomalies, machine learning algorithms can find this behavior in near real-time. Augmenting your SIEM with behavior analysis deepens your security capabilities by detecting and resolving use cases such as lateral movement, unknown threats, and data exfiltration.

Threat Hunting

Advanced and sophisticated threats can get past traditional and automated cybersecurity defenses or can be overlooked by tier 1 and 2 analysts. Establishing a successful threat hunting program is based on your environment's data quality and your ability to surface insights generally not found through day-to-day correlation activity. Security teams need to conduct investigations and threat hunting across the entire attack surface and from a single tool. When data is easily collected, normalized, accessed and analyzed, this provides valuable clues for your team's threat hunters to chase down threats. 

Checking for files created on a system

Detecting a ransomware attack

Detecting AWS network ACL activity

Detecting brute force access behavior

Detecting malicious activities with Sigma rules

Detecting network and port scanning

Detecting recurring malware on a host

Detecting software supply chain attacks

Detecting Supernova web shell malware

Detecting the use of randomization in cyberattacks

Detecting TOR traffic

Finding interactive logins from service accounts

Finding large web uploads

Monitoring a network for DNS exfiltration

Monitoring DNS queries

Monitoring full DNS transaction data

Monitoring Windows account access

Protecting a Salesforce cloud deployment

Visualizing processes and their parent/child relationships