Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Splunk Exam SPLK-2003 Topic 17 Question 64 Discussion

Actual exam question for Splunk's SPLK-2003 exam
Question #: 64
Topic #: 17
[All SPLK-2003 Questions]

Some of the playbooks on the SOAR server should only be executed by members of the admin role. How can this rule be applied?

Show Suggested Answer Hide Answer
Suggested Answer: A

To restrict playbook execution to members of the admin role within Splunk SOAR, the 'Execute Playbook' capability must be managed appropriately. This is done by ensuring that this capability is removed from all other roles except the admin role. Role-based access control (RBAC) in Splunk SOAR allows for granular permissions, which means you can configure which roles have the ability to execute playbooks, and by restricting this capability, you can control which users are able to initiate playbook runs.


Contribute your Thoughts:

Pedro
1 months ago
Option C is the way forward, no doubt. Gotta keep those playbooks in the hands of the chosen few, am I right?
upvoted 0 times
Karima
4 days ago
C) Add a filter block to all restricted playbooks that filters for runRole = 'Admin'.
upvoted 0 times
...
Bambi
13 days ago
A) Make sure the Execute Playbook capability is removed from all roles except admin.
upvoted 0 times
...
Dean
16 days ago
C) Add a filter block to all restricted playbooks that filters for runRole = 'Admin'.
upvoted 0 times
...
...
Shalon
2 months ago
I see both points, but I personally prefer option B. Keeping restricted playbooks in a separate repository adds an extra layer of security.
upvoted 0 times
...
Orville
2 months ago
I disagree, I think option C is more secure. Adding a filter block directly to the playbooks is more foolproof.
upvoted 0 times
...
Nana
2 months ago
I think option A is the best choice. It ensures that only admins can execute the playbooks.
upvoted 0 times
...
Allene
2 months ago
I bet the admin role has a secret handshake or something. Option C is the way to keep those playbooks on lockdown.
upvoted 0 times
Lelia
13 days ago
Definitely, it's important to have measures in place to control who can run certain playbooks.
upvoted 0 times
...
Luisa
16 days ago
Yeah, adding a filter block for runRole = 'Admin' seems like a secure way to restrict access.
upvoted 0 times
...
Fernanda
23 days ago
I agree, option C sounds like the best way to ensure only admins can execute those playbooks.
upvoted 0 times
...
...
Ocie
2 months ago
Ah, the admin role strikes again! Option C is definitely the way to go. Can't have the regular folks messing with the important stuff, right?
upvoted 0 times
...
Lisha
2 months ago
Hmm, I'm not sure about option B. Keeping restricted playbooks in a separate repo seems a bit complex. I'd go with C - the filter block is a straightforward solution.
upvoted 0 times
Tawny
13 days ago
I see your point. It's important to have a clear restriction in place.
upvoted 0 times
...
Alesia
28 days ago
True, but adding a filter block ensures only admins can run the playbooks.
upvoted 0 times
...
Corinne
1 months ago
But wouldn't removing the Execute Playbook capability work as well?
upvoted 0 times
...
Ruthann
1 months ago
I agree, option C seems like the simplest solution.
upvoted 0 times
...
...
Gennie
2 months ago
Option C looks like the way to go. Filtering for the admin role is a solid approach to ensure only the right people can execute those playbooks.
upvoted 0 times
Katie
11 days ago
True, adding a tag with restricted access could also help in controlling who can execute those playbooks.
upvoted 0 times
...
Erin
12 days ago
That could work too, but adding a filter block seems more specific to the restricted playbooks.
upvoted 0 times
...
Lilli
13 days ago
But wouldn't it be easier to just remove the Execute Playbook capability from all roles except admin?
upvoted 0 times
...
Adrianna
14 days ago
I agree, filtering for the admin role is a good way to restrict access.
upvoted 0 times
...
Sheron
18 days ago
True, adding a tag for restricted access could also help in controlling who can execute the playbooks.
upvoted 0 times
...
Diego
22 days ago
That could work too, but filtering seems more specific to the admin role.
upvoted 0 times
...
Nichelle
23 days ago
But wouldn't removing the Execute Playbook capability from non-admin roles also work?
upvoted 0 times
...
Cathern
1 months ago
I agree, filtering for the admin role is a good way to restrict access.
upvoted 0 times
...
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77