Splunk is proud to be recognized as a Leader in SIEM by Forrester, Gartner® and IDC. Download the latest Magic Quadrant to see why. Get the report →
Learn more about Splunk's Security Products & Solutions:
Imagine that you work in IT and security for a federal entity. How do you manage your event data across different systems and networks? When something goes wrong, how do you detect, investigate and remediate these security incidents?
That’s what the Office of Management and Budget (OMB) addresses in M-21-31: a memorandum that provides guidance for federal agencies to increase their visibility and response capabilities before, during and after a cybersecurity incident.
Here is everything you need to know about M-21-31.
In 2020, a group of hackers attacked the IT monitoring system of software company SolarWinds via the supply chain attacking technique. (Instead of hacking a target network directly, supply chain attacks target a third party in order to access the target organization's systems.) This breach had significant and widespread fallout, affecting over 18,000 SolarWinds customers, including public and private organizations and government agencies.
How threat actors harnessed the supply chain to attack SolarWinds
To prevent these types of incidents from occurring again, in 2021 President Joe Biden signed Executive Order 14028 to improve software supply chain security in the U.S.
Let’s first understand EO 14028, and then we’ll dive into the specifics of M-21-31.
President Biden signed Executive Order 14028, known as "Improving the Nation's Cybersecurity," on May 12, 2021. The goal of EO 14028 is to improve cybersecurity for federal civilian agencies and the private sector. It establishes a clear framework on how to improve cybersecurity in the U.S. and specifies the required technologies to use.
This EO has 11 sections, each focusing on different aspects of cybersecurity. Here’s a very brief, high-level look at the actions that EO 14028 recommends:
Months later, in August 2021, the OMB released the M-21-31 memorandum in support of Section 8 of the Executive Order — and the rest of this article will focus on this topic.
(A few months later, in January 2022, just months after M-21-31 published, the OMB issued another memo in support of EO 14028: M-22-09 (PDF version available). The intent of M-22-09 is to move the U.S. government into a zero-trust security model. Zero trust architecture (ZTA) assumes threats exist inside and outside traditional network boundaries. It eliminates implicit trust in any one element, node, or service. And it requires continuous verification of the operational picture via real-time information from multiple sources to determine access and other system responses.)
Splunk is particularly well-positioned to help agencies achieve the requirements in both M-21-31 and M-22-09: learn more about how we can help.
Comply with M-21-31: Learn how
Known as M-21-31 or even M-21, this memo details the requirements for government agencies to implement appropriate systems and to improve their investigative and remediation capabilities for cybersecurity incidents.
M-21-31 includes a maturity model for agencies to understand the requirements across four event logging (EL) tiers. An event is any piece of data that provides insight about a state change somewhere in an infrastructure, such as a user login. Many of these events are normal and benign, but some will signify a problem within the infrastructure.
IT events can originate from any source: databases, users, the OS and more.
These tiers depend on the criticality level of the logs that agencies must retain. The tiers are defined below:
Tier Level |
Difficulty |
Details |
EL0 |
Not Effective |
Logging requirements of highest criticality are either not met or are only partially met. |
EL1 |
Basic |
Only logging requirements of the highest criticality are met. |
EL2 |
Intermediate |
Logging requirements of highest and intermediate criticality are met. |
EL3 |
Advanced |
Logging requirements at all criticality levels are met. |
Here are the requirements for each EL tier:
But if you struggle to meet the lowest maturity level, focus on these sections to overcome your problems:
When M 21 31 was issued in August 2021, it required that agencies must meet these steps within 60 days. Today, every agency is on a journey to mature towards EL3 Advanced Requirements. Each federal agency, including CIOs, CISOs and ISSOs are responsible for complying with these mandates.
(Splunk is fully capable of helping federal agencies achieve M 21-31 maturity – get in touch to learn exactly how we can help you.)
Comply with M-21-31: Learn how
The first step is to compare your organization’s maturity against the model in the memorandum. This way, you can identify implementation gaps within your organization and determine where you need to focus your efforts.
Once you have evaluated your maturity against the model, identify implementation gaps. These gaps represent areas where your organization is not meeting the requirements outlined in M-21-31.
To identify the implementation gaps, consider the following:
(Make sense of all this with a basic understanding of log management, log analytics & event analytics.)
Next, fill the implementation gaps you have identified. And to address these gaps, make it your goal to meet the requirements of the next EL tier to reach a higher security level.
Then, submit the plans and estimates to your OMB Resource Management Office (RMO) and the Office of the Federal Chief Information Officer (OFCIO) desk officer.
You should achieve the maturity levels by the given timelines from the memorandum commission date:
Consider sharing relevant logs with the Cybersecurity and Infrastructure Security Agency (CISA), Federal Bureau of Investigation (FBI) and other federal agencies to protect federal information systems and address security risks.
So, yes, M-21-31 is a mandate that requires actions of applicable federal agencies. Besides that requirement, however, M-21-31 provides many value-add benefits on its own. Here are some of the biggest requirements — that will also benefit your department and those you work with.
M-21-31 defines a standard set of event logging requirements that all federal agencies must follow. This enables agencies to collect the same types of data consistently — making it easier to analyze and share information across agencies (one of the main goals of EO 14028). It will also ensure the collected data is sufficient to support:
Standardizing event logging requirements will improve your organization’s incident response capabilities. This way, you can identify and respond to security incidents with a consistent set of data being collected.
The maturity model also lets you identify areas where you need to improve the incident response capabilities and provide a roadmap.
By collecting more data about security events, you can better understand the scope and impact of incidents. And you can identify trends and patterns that may indicate a larger attack. Doing so will help respond quickly to security incidents.
This memorandum makes it easier for agencies to share information about security incidents, work together, and respond to threats. This collaboration can prevent attacks from spreading across multiple agencies and improve the overall security posture.
M-21-31 memorandum can improve your agency’s capabilities to prevent cybersecurity incidents. By following these guidelines, you will strengthen your agency’s security posture and help protect your work from cyber threats.
See an error or have a suggestion? Please let us know by emailing ssg-blogs@splunk.com.
This posting does not necessarily represent Splunk's position, strategies or opinion.
The Splunk platform removes the barriers between data and action, empowering observability, IT and security teams to ensure their organizations are secure, resilient and innovative.
Founded in 2003, Splunk is a global company — with over 7,500 employees, Splunkers have received over 1,020 patents to date and availability in 21 regions around the world — and offers an open, extensible data platform that supports shared data across any environment so that all teams in an organization can get end-to-end visibility, with context, for every interaction and business process. Build a strong data foundation with Splunk.