Skip to content

Splunk & SIEM Integration

Forward CBOM events and asset data to Splunk (or any SIEM) for correlation with other security events. Give your SOC visibility into cryptographic risk alongside network, endpoint, and application security data.

hidden Splunk dashboard showing CBOM events correlated with other security data


The SIEM integration sends structured event data from CBOM to your security monitoring platform:

  • New asset discoveries — When crypto assets are found during scans
  • Risk level changes — When an asset’s quantum risk classification changes
  • Policy violations — When assets fail compliance checks
  • Certificate lifecycle events — Expiry, renewal, revocation
  • Scan metadata — Scan success/failure, coverage metrics

This enables your SOC to correlate crypto events with other security signals — for example, detecting when a compromised certificate is still being used in network traffic.


MethodBest ForProtocol
HTTP Event Collector (HEC)Splunk Cloud, Splunk EnterpriseHTTPS POST
Syslog ForwardingAny SIEM (QRadar, ArcSight, LogRhythm)Syslog (CEF/LEEF)
API PollingSIEMs that pull dataREST API

Method 1: Splunk HTTP Event Collector (HEC)

Section titled “Method 1: Splunk HTTP Event Collector (HEC)”
integrations:
splunk:
method: hec
hec_url: https://splunk.company.com:8088/services/collector
hec_token: "..."
index: security
source_type: cbom:events
source: cbom-platform
verify_ssl: true
batch:
max_events: 100
flush_interval: 30s
events:
- new_asset_discovered
- risk_level_changed
- policy_violation
- cert_expired
- cert_expiry_warning
- lifecycle_state_changed
- scan_completed
- compromised_asset
{
"time": 1710432000,
"source": "cbom-platform",
"sourcetype": "cbom:events",
"index": "security",
"event": {
"event_type": "policy_violation",
"severity": "CRITICAL",
"asset": {
"id": "abc123",
"name": "payment-service signing key",
"type": "private-key",
"algorithm": "RSA-2048",
"key_size": 2048,
"quantum_risk": "CRITICAL",
"locations": ["prod-payment-01:/etc/ssl/private/payment.key"]
},
"policy": {
"name": "NIST-PQC Compliance",
"rule": "asymmetric_key_quantum_safe",
"violation": "RSA-2048 is vulnerable to quantum attack"
},
"remediation": "Migrate to ML-DSA-65 or ML-KEM-768",
"cbom_url": "https://cbom.company.com/assets/abc123"
}
}

integrations:
siem:
method: syslog
host: siem.company.com
port: 514
protocol: tcp # tcp, udp, or tls
format: cef # cef or leef
facility: local4
events:
- policy_violation
- cert_expired
- compromised_asset
- risk_level_changed
CEF:0|QCecuring|CBOM|1.0|POLICY_VIOLATION|Crypto Policy Violation|9|
src=prod-payment-01
cs1=payment-service signing key
cs1Label=AssetName
cs2=RSA-2048
cs2Label=Algorithm
cs3=NIST-PQC Compliance
cs3Label=PolicyName
cs4=CRITICAL
cs4Label=RiskLevel
msg=RSA-2048 key violates quantum-safe requirement
request=https://cbom.company.com/assets/abc123

For SIEMs that prefer to pull data:

GET /api/v1/events?since=2025-03-14T00:00:00Z&types=policy_violation,cert_expired
Authorization: Bearer <api-key>

Response:

{
"events": [
{
"id": "evt_001",
"timestamp": "2025-03-14T14:32:00Z",
"type": "policy_violation",
"severity": "CRITICAL",
"asset_id": "abc123",
"details": { ... }
}
],
"pagination": {
"next_cursor": "eyJ0..."
}
}

With CBOM data in Splunk, build dashboards for:

  • Total assets by quantum risk level
  • Violations over time (trend)
  • Top violated policies
  • Assets approaching expiry
  • Compromised certificates still seen in network traffic
  • Weak algorithms used in active TLS sessions
  • Policy violations correlated with vulnerability scan findings
  • Percentage of assets meeting PQC requirements
  • Mean time to remediate violations
  • Compliance trend over 30/60/90 days

PlatformMethodFormat
Splunk EnterpriseHECJSON
Splunk CloudHECJSON
IBM QRadarSyslogCEF/LEEF
Micro Focus ArcSightSyslogCEF
Elastic / ELKAPI Polling or WebhookJSON
DatadogAPI Polling or WebhookJSON
Microsoft SentinelAPI PollingJSON
LogRhythmSyslogCEF
Sumo LogicHEC-compatibleJSON

  • SOC visibility — Crypto events appear alongside all other security data in your SIEM
  • Correlation — Detect when compromised or expired certificates are still in active use
  • Compliance dashboards — Build executive-level crypto posture views in Splunk
  • Alerting — Use SIEM alerting rules to escalate critical crypto events
  • Forensics — Historical crypto event data for incident investigation