Recently, a customer asked if they could create additional roles beyond the default roles, ess_analyst and ess_user, that Enterprise Security provides and assign permissions to these roles to limit access based on their responsibilities. This is not a question that has come up often, but as larger Enterprise Security deployments come on line, coupled with additional capabilities like the Threat Intelligence framework, Asset & Identity framework, and Investigations, customers may find it necessary to have greater granularity in dividing up responsibilities, including who can edit correlation searches, glass tables and threat intelligence. With that in mind, let’s take a look at how additional roles can be added in Enterprise Security.
When defining a new role in Enterprise Security, an admin could take one of the pre-defined roles, like ess_analyst and use it as a template, or a new role could be created from scratch. Either approach is fine. In this example, let’s start with the existing role of ess_analyst.
After creating the new role, it can be modified further in authorize.conf, if desired. For now, let’s leave it alone as it can also be edited in the UI later.
The next step is to associate this role as a managed role within Enterprise Security. The default value is found in the inputs.conf file in $SPLUNK_HOME/etc/apps/SplunkEnterpriseSecuritySuite/default/
The Permission window will now show the new role(s) that were added,
Now that the role has been added, Enterprise Security specific capabilities can be tuned as desired.
To continue with this example, let’s take the threat intelligence framework and limit the ability to add or edit threat feeds to the Level 3 Analyst role that was just created. By default, the ES Administrator role has this capability, so we would set it for ess_level_3_analyst.
When a user with this role logs in and navigates to Configure – List and Lookups – Threat Intelligence Downloads, the screen they will see will have a New button on the left side of the screen while a user with the ess_analyst role will not. Additionally, the ability to edit or disable existing threat intelligence feeds is not enabled for the this role.
If additional modifications to the roles are required, such as limiting search to specific indexes, sources or sourcetypes, inheriting additional roles or adjusting the number of searches a specific role can execute, they can be modified in the UI from Settings - Access Controls – Roles.
Once we have created this role and started assigning capabilities, it may be desirable to audit the changes. After the role has been added, an audit log is created for the specific ES capabilities and is searchable, as seen in the following example.
In the highlighted event, the permission edit_modinput_threatlist is added to the role of ess_level_3_analyst. The search to find this is as simple as searching the _internal index and the sourcetype=app_permissions_manager. Additional criteria such as the permission or role can be used to narrow down the events returned.
The ability to add capabilities to Enterprise Security provides a way for administrators to create additional roles specific to ES while maintaining a robust audit trail. If you need to refine roles within ES beyond the ess_analyst and ess_user role, consider using this as a primer to configure additional roles.
----------------------------------------------------
Thanks!
John Stoner
The Splunk platform removes the barriers between data and action, empowering observability, IT and security teams to ensure their organizations are secure, resilient and innovative.
Founded in 2003, Splunk is a global company — with over 7,500 employees, Splunkers have received over 1,020 patents to date and availability in 21 regions around the world — and offers an open, extensible data platform that supports shared data across any environment so that all teams in an organization can get end-to-end visibility, with context, for every interaction and business process. Build a strong data foundation with Splunk.