has anybody found a way to (more or less) automate correlations between change authorizations and security configuration changes ?
am trying to streamline workflow for my soc where they dont have chase down e.g a group policy change only to find out it was authorized.
splunk is my log aggregation and SIEM platform
Just so I understand, Splunk will alert the SOC of the change but doesn't link the change approval form or log the change approval to the alert?
correct. logs from my change mgmt software - ServiceNow are being pulled into splunk as well. trying to match those as best as i can to alerts . e.g a user added to my Domain Admin group
@tmekelburg1 You could use Change Tracker R2 to correlate with the chosen SIEM, including integrity checking on specific components, folders, and files etc.
https://www.newnettechnologies.com/change-tracker-gen-7.html
Which can also be wholly independent and objective for audit and tracking purposes.
Also uses a lot of automation under the hood.
Regards
Caute_cautim
Thanks Caute! Do you have personal experience with this one or another similar solution? What's your current process to help correlate these together?
highly unlikely mgmt will approve any new purchases given the current environment. i have to make do with the tools i already have
I would see if their support could walk you through setting that up. Or at the very least they could let you know it's not possible with their current products.