The Office of Management and Budget’s memo mandates a maturity model for event log management, sets agency implementation requirements, and establishes government-wide responsibilities. Fortunately, Splunk solutions can help agencies comply with the new mandates.
As I wrote in a recent blog post, Biden Administration Executive Order Reinforces Log Standardization is Key to Security, in May 2021, the Biden Administration issued its much-anticipated Executive Order aimed at improving the cyber posture of the country. The Fact Sheet accompanying its release appropriately noted that “[r]ecent cybersecurity incidents such as SolarWinds, Microsoft Exchange, and the Colonial Pipeline incident are a sobering reminder that U.S. public and private sector entities increasingly face sophisticated malicious cyber activity from both nation-state actors and cyber criminals.” Since the Order’s release in May, we have not seen any slowing down in terms of the sophistication and frequency of incidents.
On August 27, OMB issued an implementation memo specific to the Order’s directions in Section 8 regarding log management. The “Improving the Federal Government’s Investigative and Remediation Capabilities Related to Cybersecurity Incidents” memo is broken down into three key sections:
The Maturity Model sets distinct logging tiers with the stated purpose of helping agencies to prioritize certain aspects of implementation to reach full memo compliance over time. These tiers include “not effective,” “basic,” “intermediate,” and “advanced” categorization.
In section 2 agencies are directed to immediately begin implementing the memo’s requirements, with several milestones that must be met within a specific timeframe. For example, agencies have 60 calendar days to submit any identified resource gaps and funding plans to meet the memo’s requirements. Agencies must also reach the intermediate level under the maturity model within 18 months.
In the third section on Government-Wide Responsibilities, specific tasks are given to both CISA and the Commerce Department. For CISA, they have been tasked to send teams to individual agencies to advise on their current logging capabilities and to work with the FBI to develop tools to assess logging maturity. The Commerce Department is tasked with updating NIST’s Guide to Computer Security Log Management to account for these new requirements.
The memo also includes a series of appendices covering things like centralized access and definitions. Appendix C, in particular, provides specific logging technical details that agencies are being required to follow. In this appendix, OMB breaks down log categories and corresponding required data, format, criticality, and specific retention periods.
Splunk can assist agencies in implementing these requirements in numerous ways, including:
This article was co-authored by Drew Church, Security Consulting Sales Engineer at Splunk, and Ryan Kovar, Distinguished Strategist at Splunk.
The Splunk platform removes the barriers between data and action, empowering observability, IT and security teams to ensure their organizations are secure, resilient and innovative.
Founded in 2003, Splunk is a global company — with over 7,500 employees, Splunkers have received over 1,020 patents to date and availability in 21 regions around the world — and offers an open, extensible data platform that supports shared data across any environment so that all teams in an organization can get end-to-end visibility, with context, for every interaction and business process. Build a strong data foundation with Splunk.