ZCSPM
Integrating with Splunk
ZCSPM leverages Splunk APIs to push configuration metadata for either all assets with failed status or high risk assets with failed status. You can configure the Splunk integration with ZCSPM to create time sensitive alerts such as, high risk security policy failures for AWS S3 buckets with public access. Your SOC team can immediately flag such issues and take action.
The configuration metadata is pushed to Splunk whenever ZCSPM finishes a metadata scan.
To integrate Splunk with ZCSPM:
- On the ZCSPM Admin Portal, go to Configurations > Integrations.
- In the Splunk Integration tile, click Edit.
- In the General Information section, enter the following information:
- Name: Enter the Splunk integration name.
- Splunk HTTP Event Collector (HEC) URL: Enter the Splunk HEC URL here. To learn more, see Splunk Documentation.
- Authorization Token: Enter the HEC authorization token which ZCSPM will use to push data into Splunk.
- (Optional) Source Type: An optional field which identifies the data structure of the HEC.
- (Optional) Index: An optional field which identifes the Splunk data repository.
- Status: Select Enable to activate the integration.
- In the Scope section, enter the following information:
- Cloud Accounts: Select the cloud accounts for which ZCSPM should send configuration metadata.
- Scope of Assets: Select whether you want configuration metadata sent for all assets which have failed status or high risk assets with failed status.
- Click Save.
To view the configuration metadata on Splunk:
- On the Splunk Cloud, go to Apps > Search & Reporting.
- You can search for the index where you set up the ZCSPM configuration metadata to be sent by entering the following command in the search bar:
index="<index name>"