Splunk Integrates with Amazon Security Lake to Deliver Analytics Using the Open Cybersecurity Schema Framework

It’s been an exciting few months behind the scenes since the Open Cybersecurity Schema Framework (OCSF) project was made public and announced at Black Hat in August. From the original 18-company coalition that helped define the initial OCSF release, the project now has over 200 individual collaborators from more than 60 organizations. OCSF includes collaborators from educational institutions and government agencies, showing the broad appeal and interest in producing an open security data standard for the benefit of cybersecurity as a whole.

But I’m not writing just to give an update on OCSF membership. This week, at AWS re:Invent, Amazon Web Services (AWS) announced Amazon Security Lake, the first service that utilizes OCSF as the data schema foundation. Amazon Security Lake is in public preview and allows customers to build a security data lake from integrated cloud and on-premises data sources and from their private applications. With Amazon Security Lake, customers can use the security and analytics solutions of their choice to query and analyze that data in place or ingest the OCSF-compliant data to perform advanced analytics and investigations.

Splunk is proud to be one of the early partners of Amazon Security Lake and a leading member of the community implementing OCSF standards that benefit the broader cybersecurity community. In conjunction with the public beta, Splunk has released a public preview of Splunk Add-On for Amazon Security Lake to our Splunkbase content marketplace. This service allows the Splunk platform to efficiently ingest the OCSF-compliant data from Amazon Security Lake, enabling security teams to easily use this data to improve threat detection, investigation and response.

Joint Splunk and AWS customers can benefit significantly from this integration as it delivers one of the big benefits of OCSF, namely the simplification of sharing and analyzing disparate security data by eliminating the step of normalizing the data first. By storing data in OCSF-compliant format, Amazon Security Lake simplifies the work it takes to ingest and analyze security data within Splunk by being a single feed to manage versus multiple services coming from AWS or other Amazon Security Lake security partners.

This work would not have been possible without the long-standing strategic collaboration between Splunk and AWS, which celebrates its tenth year this year. Splunk and AWS are committed to working together to deliver compelling solutions to our joint customers that empower them to solve their most significant business data challenges. This collaboration is just the latest in a long line of high impact innovations that has elevated security operations for our joint customers.

Back in August, we laid out the vision to establish a foundation to help unburden security teams of the work required to collect and normalize security data so they can focus on the threat detection, investigation, and remediation work they are uniquely able to carry out. I am very proud of this first delivery toward that vision and am ever excited about what the future holds and the collaboration within our security community OCSF fosters.

To learn how to connect your Amazon Security Lake data with Splunk, head over to Splunk Add-On for Amazon Security Lake on Splunkbase or review the documentation first and get involved in the public preview program today.

Finally, if you’re attending AWS re:Invent this week in Las Vegas, I encourage you to stop by the Splunk booth (Booth #3516) to experience AWS & Splunk. Splunk is a Diamond sponsor of AWS re:Invent and will be hosting theater sessions, demos, meetings and even our very own McLaren simulator within the booth. Tom Smit, Principal Security Strategist at Splunk, will also be presenting a 60-minute speaking session, “Detecting SSRF attacks in AWS using Splunk'' on Wednesday at 3:15pm PST. To learn more about our presence at AWS re:Invent, check out our re:Invent microsite here.

Related Articles

Predicting Cyber Fraud Through Real-World Events: Insights from Domain Registration Trends
Security
12 Minute Read

Predicting Cyber Fraud Through Real-World Events: Insights from Domain Registration Trends

By analyzing new domain registrations around major real-world events, researchers show how fraud campaigns take shape early, helping defenders spot threats before scams surface.
When Your Fraud Detection Tool Doubles as a Wellness Check: The Unexpected Intersection of Security and HR
Security
4 Minute Read

When Your Fraud Detection Tool Doubles as a Wellness Check: The Unexpected Intersection of Security and HR

Behavioral analytics can spot fraud and burnout. With UEBA built into Splunk ES Premier, one data set helps security and HR reduce risk, retain talent, faster.
Splunk Security Content for Threat Detection & Response: November Recap
Security
1 Minute Read

Splunk Security Content for Threat Detection & Response: November Recap

Discover Splunk's November security content updates, featuring enhanced Castle RAT threat detection, UAC bypass analytics, and deeper insights for validating detections on research.splunk.com.
Security Staff Picks To Read This Month, Handpicked by Splunk Experts
Security
2 Minute Read

Security Staff Picks To Read This Month, Handpicked by Splunk Experts

Our Splunk security experts share their favorite reads of the month so you can follow the most interesting, news-worthy, and innovative stories coming from the wide world of cybersecurity.
Behind the Walls: Techniques and Tactics in Castle RAT Client Malware
Security
10 Minute Read

Behind the Walls: Techniques and Tactics in Castle RAT Client Malware

Uncover CastleRAT malware's techniques (TTPs) and learn how to build Splunk detections using MITRE ATT&CK. Protect your network from this advanced RAT.
AI for Humans: A Beginner’s Field Guide
Security
12 Minute Read

AI for Humans: A Beginner’s Field Guide

Unlock AI with the our beginner's field guide. Demystify LLMs, Generative AI, and Agentic AI, exploring their evolution and critical cybersecurity applications.
Splunk Security Content for Threat Detection & Response: November 2025 Update
Security
5 Minute Read

Splunk Security Content for Threat Detection & Response: November 2025 Update

Learn about the latest security content from Splunk.
Operation Defend the North: What High-Pressure Cyber Exercises Teach Us About Resilience and How OneCisco Elevates It
Security
3 Minute Read

Operation Defend the North: What High-Pressure Cyber Exercises Teach Us About Resilience and How OneCisco Elevates It

The OneCisco approach is not about any single platform or toolset; it's about fusing visibility, analytics, and automation into a shared source of operational truth so that teams can act decisively, even in the fog of crisis.
Data Fit for a Sovereign: How to Consider Sovereignty in Your Digital Resilience Strategy
Security
5 Minute Read

Data Fit for a Sovereign: How to Consider Sovereignty in Your Digital Resilience Strategy

Explore how digital sovereignty shapes resilient strategies for European organisations. Learn how to balance control, compliance, and agility in your data infrastructure with Cisco and Splunk’s flexible, secure solutions for the AI era.