S O L U T I O N S G U I D E
Meet Compliance Requirements by Monitoring,
Alerting and Reporting on Machine Data
Splunk for Compliance
listen to your data
Cost effective, Sustainable Compliance
Splunk Enterprise is a massively scalable data engine for
machine-generated data. It collects, indexes and harnesses
machine data across your infrastructure in real time. Splunk
offers a cost effective and flexible way to meet your compliance
requirements from audit trail collection and reporting, to file
integrity monitoring with a single solution.
Meet requirements to collect, retain, search, alert and report
on logs and machine data throughout your IT infrastructure.
Generate any report in seconds and automate reporting to
compliance analysts and auditors with scheduled searches and
reports.
•	 E-Discovery - Search every data source required for
E-Discovery from one place. Get instantaneous results
across large data sets.
•	 FISMA - Securely collect, index and store all your log
and Machine Data along with audit trails to meet NIST
requirements.
•	 HIPAA - Search all your machine data to instantly assess
reports of EPHI leakage and meet HIPAA’s explicit log
requirements.
•	 PCI - Rapid compliance with explicit PCI requirements
for log retention/review and change monitoring,
comprehensive reporting on all PCI controls such as
passwords and firewall policy.
•	 SOX - Splunk makes the ambiguous chore of compliance-
mandated routine log review easy and straightforward.
Demonstrate “due-care” and increase operational efficiency by
eliminating compliance friction.
The Compliance Challenge
Reporting on firewall, access control and application logs and
machine data to demonstrate compliance controls is difficult and
costly. Each of these systems generate logs in different formats
and locations. Each auditor request involves a different, manual
procedure. But the requirement to limit access to production
systems has an even bigger impact. System administrators and
developers are denied access to production systems to analyze
logs and configurations, limiting their ability to respond to
operations and security incidents.
Enter Splunk
Bring powerful indexing, search, alerting and reporting to the
challenges of change management. With Splunk you can search,
alert and report on machine data from virtually any source.
Meet compliance requirements from audit trail collection and
reporting, to file integrity monitoring with a single solution.
Generate any compliance report in seconds. And you’ll overcome
the operational impact of demands to restrict production
system access by giving developers and application support
secure, read-only access to the machine data they need without
touching production systems.
Secure data retention
Splunk provides a highly efficient and secure solution for
capturing and retaining your machine data for extended periods.
Securely capture all your data in real-time including syslog and
even complex application logs. Integrity is ensured via hardened
deployments and comprehensive auditing and security. Archive
or retire data based on age or storage limits.
Controlled data access
Splunk helps eliminate the compliance barriers that get in
the way of operations. Provide developers and application
administrators with real-time access to the logs, configurations
and status commands they need in order to analyze and resolve
production problems. Role based access controls let you adhere
to strict compliance with production server access restrictions.
Compliance reporting
Meet explicit requirements to monitor, review and retain
logs, configurations and other machine data. Demonstrate
compliance quickly and easily across other types of controls.
Report on firewall activity to show that firewall policy is in place
and functioning correctly. Report on access control events to
show that account deactivation procedures are being followed.
Generate ad hoc reports to answer auditor questions in seconds
and automate reports with scheduled searches.
Security monitoring
Splunk lets you meet requirements to automate monitoring of
security events. Index audit trails across firewalls, applications,
access control, IDS and other components, then simply save,
schedule and set alerting rules for a search. Alerts can send
notifications via email, RSS, SMS or trigger scripts for easy
integration with your existing monitoring consoles. As new
mandates create new monitoring requirements, simply add new
data sources and searches.
www.splunk.com
250 Brannan St, San Francisco, CA, 94107 info@splunk.com | sales@splunk.com 866-438-7758 | 415-848-8400 www.splunkbase.com
S O L U T I O N S G U I D E
listen to your data
Copyright © 2012 Splunk Inc. All rights reserved. Splunk Enterprise is protected by U.S. and international copyright and intellectual property laws.
Splunk is a registered trademark or trademark of Splunk Inc. in the United States and/or other jurisdictions. All other marks and names mentioned
herein may be trademarks of their respective companies. Item # SG-Splunk-Complience-101
Compliance investigations
Minimize the distraction of compliance investigations and
discovery requests. Stop using a different tool for each of your
systems—web proxies, email servers, and more. Splunk’s fast and
simple search across your data will get you the information in
seconds.
Audit trail review
Splunk makes the ambiguous chore of compliance-mandated
routine log review easy and straightforward. Search Splunk
daily for activity from the previous day on in-scope servers.
Use Splunk’s time histogram and filters to understand patterns.
Classify and tag innocuous events as “ok”. Search for events not
tagged “ok” the next day so that you’re only looking at new or
suspicious events each day. Best of all, Splunk tracks your review
history for auditors.
Splunk for Compliance Applications
E-Discovery
Escalating law enforcement requests to investigate suspected
criminal activity online are distracting IT at education institutions
and large enterprises that provide Internet access. Servicing
requests is a distracting and time consuming and the inability to
respond effectively opens organizations to legal risk.
“When the FBI is asking for intelligence under a
tight timeline, you need to be able to search your IT
data and generate any material findings quickly.”
Anonymous
Splunk makes E-Discovery fast and easy. You can search
every data source required for E-Discovery from one place.
Instantaneous results across large data sets slash the time to
respond to requests. Set-up simple searches for HR personnel
to lift the burden from IT staff. Data signing and audit trails
demonstrate the integrity of your results.
FISMA
FISMA and NIST standards require Federal Government
Agencies have the ability to effectively respond to incidents
by analyzing massive amounts of data from large network and
IT infrastructures..Splunk scales to provide visibility into the
security technologies in large network infrastructures. Powerful
search and reporting of results and flexible ways to organize and
tag systems with inventory information and enable the creation
of status views for different security controls or locations.
“Federal agencies should implement Splunk
because it’s can bring all the security information
together, correlate and bring a coherent picture of
your security posture.”
Bill Hornish
Federal Business Development, Splunk
S O L U T I O N S G U I D E
HIPAA
HIPAA and EPHI security and privacy rules include explicit
requirements for audit trail collection, review, automated
monitoring and incident investigation. But providers and
insurance carriers lack the ability to rapidly search machine
data in support of incident investigation requirements. Slow,
manual investigation process raises level of exposure and risk
of violations. Splunk closes HIPAA compliance gaps. Search
your machine data to instantly assess reports of EPHI leakage
and meet HIPAA’s explicit log collection and monitoring
requirements.
“Splunk is the CHW standard for event logging for
HIPAA. It’s a critical tool for monitoring access to
information to our business, and patient privacy.”
Steve Hight
Director Strategic Technology, CHW
PCI DSS
Credit card merchants find collecting and retaining audit trails
for at least one year is the most daunting PCI compliance
requirement. It’s difficult to access, analyze and manage all the
data from card processing systems. Existing PCI solutions are
expensive, clumsy and difficult to maintain. The Splunk App is a
pre-packed application that provides rapid compliance with PCI
requirements for audit trail collection, retention and review.
“Failure to comply with PCI equates to failure for
our business. Splunk enables us to demonstrate
compliance across all PCI DSS requirements.”
Peter Bassill
CISSP, Gala Coral Croup
SOX
Sarbanes-Oxley IT compliance has driven public companies and
their vendors to adopt stringent IT controls based on ITIL, COBiT,
COSO, ISO 17799, BS-7799 and other best-practice frameworks
for IT operations and security. Demonstrating these controls
has become a huge burden for IT operations, Splunk provides
comprehensive visibility for SOX IT controls. Search the data
generated by SOX control tools and technologies from one place.
Instantaneous retrieve the information requested by IT auditors.
“Splunk automated our evidence gathering for SOX
compliance, saving engineering from working on
compliance related tasks”.
David Jones
IT Ops Manager., Alexza Pharmaceutical
Free Download
Download Splunk for free. You’ll get a Splunk Enterprise
license for 60 days and you can index up to 500 megabytes
of data per day. After 60 days, or anytime before then, you
can convert to a perpetual Free license or purchase an
Enterprise license by contacting sales@splunk.com.

More Related Content

PPTX
Operational Security
PPTX
Splunk for Industrial Data and the Internet of Things
PPTX
Enterprise Security and User Behavior Analytics
PPTX
Best Practices For Sharing Data Across The Enteprrise
PPTX
Splunk Discovery Day Düsseldorf 2016 - Splunk für Security
PPTX
Splunk for ITOA Breakout Session
PPTX
Splunk für Security
PPTX
SplunkLive! Milano 2016 - Splunk Plenary Session
Operational Security
Splunk for Industrial Data and the Internet of Things
Enterprise Security and User Behavior Analytics
Best Practices For Sharing Data Across The Enteprrise
Splunk Discovery Day Düsseldorf 2016 - Splunk für Security
Splunk for ITOA Breakout Session
Splunk für Security
SplunkLive! Milano 2016 - Splunk Plenary Session

What's hot (20)

PPTX
SplunkLive! Splunk for Security
PDF
SplunkLive! München 2016 - Splunk für Security
PDF
Applying Auto-Data Classification Techniques for Large Data Sets
PPTX
Using Big Data for Cybersecurity
PDF
Splunk for Security
PPTX
Splunk Discovery Day Düsseldorf 2016
PDF
Splunk for Industrial Data and the Internet of Things
PPTX
Splunk Internet of Things Roundtable 2015
PDF
Getting Started with Splunk Hands-on
PPTX
Splunk for IT Operations
PPTX
Building a Security Information and Event Management platform at Travis Per...
PDF
Enterprise Security featuring UBA
PPTX
Splunk for Monitoring and Diagnostics in the Industrial Environment
PPTX
Splunk for ITOA Breakout Session
PDF
Enterprise Security Guided Tour
PDF
SplunkLive! London 2016 Operational Security Intelligence
PPTX
SplunkLive! Splunk for Insider Threats and Fraud Detection
PDF
Splunk Enterprise for InfoSec Hands-On Breakout Session
PDF
Realities of Data Security
PPTX
User and entity behavior analytics: building an effective solution
SplunkLive! Splunk for Security
SplunkLive! München 2016 - Splunk für Security
Applying Auto-Data Classification Techniques for Large Data Sets
Using Big Data for Cybersecurity
Splunk for Security
Splunk Discovery Day Düsseldorf 2016
Splunk for Industrial Data and the Internet of Things
Splunk Internet of Things Roundtable 2015
Getting Started with Splunk Hands-on
Splunk for IT Operations
Building a Security Information and Event Management platform at Travis Per...
Enterprise Security featuring UBA
Splunk for Monitoring and Diagnostics in the Industrial Environment
Splunk for ITOA Breakout Session
Enterprise Security Guided Tour
SplunkLive! London 2016 Operational Security Intelligence
SplunkLive! Splunk for Insider Threats and Fraud Detection
Splunk Enterprise for InfoSec Hands-On Breakout Session
Realities of Data Security
User and entity behavior analytics: building an effective solution
Ad

Similar to Splunk for compliance (20)

PPTX
SplunkLive! Customer Presentation – athenahealth
PPTX
SplunkLive! Customer Presentation – athenahealth
PPTX
Security crawl walk run presentation mckay v1 2017
PPTX
SplunkLive! Customer Presentation – athenahealth
PPTX
Virtual Gov Day - Security Breakout - Deloitte
PDF
Rapidly Improving Security Posture - CanDeal
PPTX
Splunk at Weill Cornell Medical College
PDF
Splunk for fisma
PPTX
Latest Updates to Splunk from .conf 2017 Announcements
PPTX
Customer Presentation with a Healthcare Company
PPTX
SplunkLive! Customer Presentation – HCA
PPTX
Splunk EMEA Webinar: Scoping infections and disrupting breaches
PPTX
Splunk Discovery Dusseldorf: September 2017 - Security Session
PPTX
SplunkLive! Austin Customer Presentation - Baylor
PPTX
Sl nashville major Hospital company
PDF
Splunk, SIEMs, and Big Data - The Undercroft - November 2019
PPTX
Splunk enterprise security_splunk_bengaluru_user_group_2020_10_03
PDF
Splunk for application_management
PPTX
Splunk for Security Breakout Session
PPTX
Customer Presentation, FirstSolar
SplunkLive! Customer Presentation – athenahealth
SplunkLive! Customer Presentation – athenahealth
Security crawl walk run presentation mckay v1 2017
SplunkLive! Customer Presentation – athenahealth
Virtual Gov Day - Security Breakout - Deloitte
Rapidly Improving Security Posture - CanDeal
Splunk at Weill Cornell Medical College
Splunk for fisma
Latest Updates to Splunk from .conf 2017 Announcements
Customer Presentation with a Healthcare Company
SplunkLive! Customer Presentation – HCA
Splunk EMEA Webinar: Scoping infections and disrupting breaches
Splunk Discovery Dusseldorf: September 2017 - Security Session
SplunkLive! Austin Customer Presentation - Baylor
Sl nashville major Hospital company
Splunk, SIEMs, and Big Data - The Undercroft - November 2019
Splunk enterprise security_splunk_bengaluru_user_group_2020_10_03
Splunk for application_management
Splunk for Security Breakout Session
Customer Presentation, FirstSolar
Ad

More from Greg Hanchin (20)

PDF
NUTANIX and SPLUNK
PDF
Splunk for exchange
PDF
Splunk for cyber_threat
PDF
Splunk Searching and reporting 43course
PDF
Advanced Splunk 50 administration
PDF
Advanced searching and reporting 50 course
PDF
Administering splunk 43 course
PDF
Using splunk43course
PDF
Using Splunk course outline
PDF
Advanced Splunk Administration
PDF
Splunk Advanced searching and reporting Class description
PDF
Administering Splunk course
PDF
Splunk Searching and Reporting Class Details
PPTX
Splunk FISMA for Continuous Monitoring
PDF
Splunk forwarders tech_brief
PDF
Splunk and map_reduce
PDF
Splunk for xen_desktop
PDF
Splunk for palo_alto
PDF
Splunk for ibtrm
PDF
Splunk for f5
NUTANIX and SPLUNK
Splunk for exchange
Splunk for cyber_threat
Splunk Searching and reporting 43course
Advanced Splunk 50 administration
Advanced searching and reporting 50 course
Administering splunk 43 course
Using splunk43course
Using Splunk course outline
Advanced Splunk Administration
Splunk Advanced searching and reporting Class description
Administering Splunk course
Splunk Searching and Reporting Class Details
Splunk FISMA for Continuous Monitoring
Splunk forwarders tech_brief
Splunk and map_reduce
Splunk for xen_desktop
Splunk for palo_alto
Splunk for ibtrm
Splunk for f5

Recently uploaded (20)

PDF
Zenith AI: Advanced Artificial Intelligence
PPTX
Benefits of Physical activity for teenagers.pptx
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PDF
Comparative analysis of machine learning models for fake news detection in so...
PPTX
2018-HIPAA-Renewal-Training for executives
PPTX
TEXTILE technology diploma scope and career opportunities
PDF
Flame analysis and combustion estimation using large language and vision assi...
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PDF
A proposed approach for plagiarism detection in Myanmar Unicode text
PDF
Getting started with AI Agents and Multi-Agent Systems
PDF
CloudStack 4.21: First Look Webinar slides
PDF
Convolutional neural network based encoder-decoder for efficient real-time ob...
PDF
A review of recent deep learning applications in wood surface defect identifi...
PDF
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
PDF
OpenACC and Open Hackathons Monthly Highlights July 2025
PPTX
The various Industrial Revolutions .pptx
PDF
Consumable AI The What, Why & How for Small Teams.pdf
PPTX
Microsoft Excel 365/2024 Beginner's training
PDF
sustainability-14-14877-v2.pddhzftheheeeee
Zenith AI: Advanced Artificial Intelligence
Benefits of Physical activity for teenagers.pptx
A contest of sentiment analysis: k-nearest neighbor versus neural network
Comparative analysis of machine learning models for fake news detection in so...
2018-HIPAA-Renewal-Training for executives
TEXTILE technology diploma scope and career opportunities
Flame analysis and combustion estimation using large language and vision assi...
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
A proposed approach for plagiarism detection in Myanmar Unicode text
Getting started with AI Agents and Multi-Agent Systems
CloudStack 4.21: First Look Webinar slides
Convolutional neural network based encoder-decoder for efficient real-time ob...
A review of recent deep learning applications in wood surface defect identifi...
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
OpenACC and Open Hackathons Monthly Highlights July 2025
The various Industrial Revolutions .pptx
Consumable AI The What, Why & How for Small Teams.pdf
Microsoft Excel 365/2024 Beginner's training
sustainability-14-14877-v2.pddhzftheheeeee

Splunk for compliance

  • 1. S O L U T I O N S G U I D E Meet Compliance Requirements by Monitoring, Alerting and Reporting on Machine Data Splunk for Compliance listen to your data Cost effective, Sustainable Compliance Splunk Enterprise is a massively scalable data engine for machine-generated data. It collects, indexes and harnesses machine data across your infrastructure in real time. Splunk offers a cost effective and flexible way to meet your compliance requirements from audit trail collection and reporting, to file integrity monitoring with a single solution. Meet requirements to collect, retain, search, alert and report on logs and machine data throughout your IT infrastructure. Generate any report in seconds and automate reporting to compliance analysts and auditors with scheduled searches and reports. • E-Discovery - Search every data source required for E-Discovery from one place. Get instantaneous results across large data sets. • FISMA - Securely collect, index and store all your log and Machine Data along with audit trails to meet NIST requirements. • HIPAA - Search all your machine data to instantly assess reports of EPHI leakage and meet HIPAA’s explicit log requirements. • PCI - Rapid compliance with explicit PCI requirements for log retention/review and change monitoring, comprehensive reporting on all PCI controls such as passwords and firewall policy. • SOX - Splunk makes the ambiguous chore of compliance- mandated routine log review easy and straightforward. Demonstrate “due-care” and increase operational efficiency by eliminating compliance friction. The Compliance Challenge Reporting on firewall, access control and application logs and machine data to demonstrate compliance controls is difficult and costly. Each of these systems generate logs in different formats and locations. Each auditor request involves a different, manual procedure. But the requirement to limit access to production systems has an even bigger impact. System administrators and developers are denied access to production systems to analyze logs and configurations, limiting their ability to respond to operations and security incidents. Enter Splunk Bring powerful indexing, search, alerting and reporting to the challenges of change management. With Splunk you can search, alert and report on machine data from virtually any source. Meet compliance requirements from audit trail collection and reporting, to file integrity monitoring with a single solution. Generate any compliance report in seconds. And you’ll overcome the operational impact of demands to restrict production system access by giving developers and application support secure, read-only access to the machine data they need without touching production systems. Secure data retention Splunk provides a highly efficient and secure solution for capturing and retaining your machine data for extended periods. Securely capture all your data in real-time including syslog and even complex application logs. Integrity is ensured via hardened deployments and comprehensive auditing and security. Archive or retire data based on age or storage limits. Controlled data access Splunk helps eliminate the compliance barriers that get in the way of operations. Provide developers and application administrators with real-time access to the logs, configurations and status commands they need in order to analyze and resolve production problems. Role based access controls let you adhere to strict compliance with production server access restrictions. Compliance reporting Meet explicit requirements to monitor, review and retain logs, configurations and other machine data. Demonstrate compliance quickly and easily across other types of controls. Report on firewall activity to show that firewall policy is in place and functioning correctly. Report on access control events to show that account deactivation procedures are being followed. Generate ad hoc reports to answer auditor questions in seconds and automate reports with scheduled searches. Security monitoring Splunk lets you meet requirements to automate monitoring of security events. Index audit trails across firewalls, applications, access control, IDS and other components, then simply save, schedule and set alerting rules for a search. Alerts can send notifications via email, RSS, SMS or trigger scripts for easy integration with your existing monitoring consoles. As new mandates create new monitoring requirements, simply add new data sources and searches.
  • 2. www.splunk.com 250 Brannan St, San Francisco, CA, 94107 [email protected] | [email protected] 866-438-7758 | 415-848-8400 www.splunkbase.com S O L U T I O N S G U I D E listen to your data Copyright © 2012 Splunk Inc. All rights reserved. Splunk Enterprise is protected by U.S. and international copyright and intellectual property laws. Splunk is a registered trademark or trademark of Splunk Inc. in the United States and/or other jurisdictions. All other marks and names mentioned herein may be trademarks of their respective companies. Item # SG-Splunk-Complience-101 Compliance investigations Minimize the distraction of compliance investigations and discovery requests. Stop using a different tool for each of your systems—web proxies, email servers, and more. Splunk’s fast and simple search across your data will get you the information in seconds. Audit trail review Splunk makes the ambiguous chore of compliance-mandated routine log review easy and straightforward. Search Splunk daily for activity from the previous day on in-scope servers. Use Splunk’s time histogram and filters to understand patterns. Classify and tag innocuous events as “ok”. Search for events not tagged “ok” the next day so that you’re only looking at new or suspicious events each day. Best of all, Splunk tracks your review history for auditors. Splunk for Compliance Applications E-Discovery Escalating law enforcement requests to investigate suspected criminal activity online are distracting IT at education institutions and large enterprises that provide Internet access. Servicing requests is a distracting and time consuming and the inability to respond effectively opens organizations to legal risk. “When the FBI is asking for intelligence under a tight timeline, you need to be able to search your IT data and generate any material findings quickly.” Anonymous Splunk makes E-Discovery fast and easy. You can search every data source required for E-Discovery from one place. Instantaneous results across large data sets slash the time to respond to requests. Set-up simple searches for HR personnel to lift the burden from IT staff. Data signing and audit trails demonstrate the integrity of your results. FISMA FISMA and NIST standards require Federal Government Agencies have the ability to effectively respond to incidents by analyzing massive amounts of data from large network and IT infrastructures..Splunk scales to provide visibility into the security technologies in large network infrastructures. Powerful search and reporting of results and flexible ways to organize and tag systems with inventory information and enable the creation of status views for different security controls or locations. “Federal agencies should implement Splunk because it’s can bring all the security information together, correlate and bring a coherent picture of your security posture.” Bill Hornish Federal Business Development, Splunk S O L U T I O N S G U I D E HIPAA HIPAA and EPHI security and privacy rules include explicit requirements for audit trail collection, review, automated monitoring and incident investigation. But providers and insurance carriers lack the ability to rapidly search machine data in support of incident investigation requirements. Slow, manual investigation process raises level of exposure and risk of violations. Splunk closes HIPAA compliance gaps. Search your machine data to instantly assess reports of EPHI leakage and meet HIPAA’s explicit log collection and monitoring requirements. “Splunk is the CHW standard for event logging for HIPAA. It’s a critical tool for monitoring access to information to our business, and patient privacy.” Steve Hight Director Strategic Technology, CHW PCI DSS Credit card merchants find collecting and retaining audit trails for at least one year is the most daunting PCI compliance requirement. It’s difficult to access, analyze and manage all the data from card processing systems. Existing PCI solutions are expensive, clumsy and difficult to maintain. The Splunk App is a pre-packed application that provides rapid compliance with PCI requirements for audit trail collection, retention and review. “Failure to comply with PCI equates to failure for our business. Splunk enables us to demonstrate compliance across all PCI DSS requirements.” Peter Bassill CISSP, Gala Coral Croup SOX Sarbanes-Oxley IT compliance has driven public companies and their vendors to adopt stringent IT controls based on ITIL, COBiT, COSO, ISO 17799, BS-7799 and other best-practice frameworks for IT operations and security. Demonstrating these controls has become a huge burden for IT operations, Splunk provides comprehensive visibility for SOX IT controls. Search the data generated by SOX control tools and technologies from one place. Instantaneous retrieve the information requested by IT auditors. “Splunk automated our evidence gathering for SOX compliance, saving engineering from working on compliance related tasks”. David Jones IT Ops Manager., Alexza Pharmaceutical Free Download Download Splunk for free. You’ll get a Splunk Enterprise license for 60 days and you can index up to 500 megabytes of data per day. After 60 days, or anytime before then, you can convert to a perpetual Free license or purchase an Enterprise license by contacting [email protected].