PCI Command History

This report provides visibility into the commands that are run on PCI assets. Monitor this report on a daily basis to ensure that no excessively privileged commands are being run. You should investigate unexpected commands further.

When configuring privileged IDs on systems, make sure you assign individuals only the least privileges needed for the task at hand. Assigning least privileges helps prevent users without sufficient training from incorrectly or accidentally changing operational configuration or altering security settings. Least privilege can also help to minimize the amount of damage from unauthorized access to a privileged ID.

How to configure this report

  1. Index bash history data in Splunk platform.
  2. Populate the fields: bash_command, bash_user, and bash_user_root.

Report description

The data in the PCI Command History report is populated by a search against the bash_history sourcetype, sourcetype=bash_history.

Useful searches for troubleshooting

Troubleshooting Task Search/Action Expected Result
Verify that data is present. sourcetype=bash_history Data is present.
Verify that fields are normalized and available. table bash_user bash_user_root bash_command Fields are available and match the data model.