Skip to content

Federal Migration Guide: Splunk to Sentinel in Government

Status: Authored 2026-04-30 Audience: Federal CISOs, DoD Security Architects, Civilian Agency Security Teams, AOs Purpose: Federal-specific guidance for migrating from Splunk to Microsoft Sentinel in Azure Government environments


1. Federal SIEM landscape

Splunk's federal dominance

Splunk holds the dominant SIEM market position across the US federal government:

Federal sector Splunk market position Key agencies
Department of Defense Primary SIEM across most military departments Army, Navy, Air Force, DISA, combatant commands
Intelligence Community Widely deployed for security analytics IC agencies, NSA, NGA
Civilian CFO Act agencies Incumbent at most large agencies DHS, DOJ, Treasury, State, HHS, VA, Commerce
Law enforcement Standard for security and compliance FBI, DEA, ATF, USMS, Secret Service
Regulatory agencies Common deployment SEC, CFTC, FTC, FDIC

What this means for migration planning: The federal Splunk ecosystem is large, mature, and deeply embedded. Migration is not just a technology change -- it requires addressing procurement vehicles, existing BPAs, trained workforce, and institutional knowledge.

Sentinel's federal growth

Microsoft Sentinel in Azure Government is growing rapidly:

  • Multiple DoD components have completed or are executing Splunk-to-Sentinel migrations
  • ArcSight end-of-life is driving federal agencies to Sentinel as a replacement
  • The SIEM Migration Experience was designed specifically for large federal Splunk deployments
  • Azure Government FedRAMP High authorization provides compliance foundation
  • Sentinel is increasingly specified in new federal RFPs alongside or instead of Splunk

ArcSight displacement in DoD

Micro Focus ArcSight, once the dominant DoD SIEM, is reaching end-of-life. Sentinel is the primary beneficiary:

ArcSight gap Sentinel advantage
On-premises only, aging architecture Cloud-native, zero infrastructure
Limited AI/ML capabilities Security Copilot native
Complex deployment and maintenance Managed Azure service
Declining vendor support Microsoft's investment in federal security

2. Azure Government for Sentinel

Authorization and compliance

Framework Sentinel in Azure Government Notes
FedRAMP High Authorized Inherited from Azure Government P-ATO
DoD IL2 Authorized Full availability
DoD IL4 Authorized Full Sentinel capability
DoD IL5 Authorized Most Sentinel capabilities available
DoD IL6 Not available Classified SCI workloads not supported
CJIS Available Azure Government meets CJIS requirements
ITAR Compliant Azure Government data residency
IRS 1075 Compliant FTI handling supported
NIST 800-53 Rev 5 Controls mapped CSA-in-a-Box provides machine-readable control matrix
CMMC 2.0 Supports Level 1-3 CSA-in-a-Box provides practice-level mappings
HIPAA BAA available CSA-in-a-Box provides HIPAA security rule matrix

Azure Government vs Azure Commercial for Sentinel

Capability Azure Government Azure Commercial Notes
Sentinel core (analytics, incidents) Full Full Feature parity
Content Hub Available Full Most solutions available in Gov
Security Copilot Available Full Gov deployment may lag slightly
UEBA Available Full Entity behavior analytics
Logic Apps (playbooks) Available Full May have connector differences
Notebooks (Jupyter) Available Full MSTICPy library supported
Data connectors Most available Full Some third-party connectors may lag
Multi-workspace Full Full Azure Lighthouse supported
Azure Data Explorer Available Full Long-term retention

Azure Government endpoints

Service Azure Government endpoint
Defender portal https://security.microsoft.us
Azure portal https://portal.azure.us
Log Analytics https://\<workspace>.ods.opinsights.azure.us
Data Collection API https://\<dce>.usgovvirginia-1.ingest.monitor.azure.us
Azure Monitor Agent Standard install; auto-detects Gov environment

3. Federal compliance and event retention

Event retention requirements by framework

Framework Online retention Archive retention Implementation
NIST 800-53 AU-11 Agency-defined (typically 90 days - 1 year) Agency-defined (typically 3-7 years) Log Analytics interactive + Archive tier
FedRAMP High 12 months minimum online As specified in SSP Log Analytics 12-month retention
DoD STIG 1 year online 5 years archive Log Analytics 1 year + ADX/Blob 5 years
CJIS 1 year As required Log Analytics 1 year
HIPAA 6 years N/A ADX for full 6-year queryable retention
IRS 1075 7 years for FTI N/A ADX or Blob Archive for 7 years
FISMA Per agency ISSM guidance Per agency ISSM guidance Configurable per-table retention

Implementing federal retention in Sentinel

// Bicep: Configure federal-compliant retention
resource workspace 'Microsoft.OperationalInsights/workspaces@2022-10-01' = {
  name: 'law-sentinel-gov'
  location: 'usgovvirginia'
  properties: {
    sku: {
      name: 'PerGB2018'
    }
    retentionInDays: 365  // 1-year online retention (FedRAMP High minimum)
    features: {
      enableDataExport: true  // Enable export to ADX for long-term
    }
  }
}

// Per-table retention for compliance
resource securityEventRetention 'Microsoft.OperationalInsights/workspaces/tables@2022-10-01' = {
  parent: workspace
  name: 'SecurityEvent'
  properties: {
    retentionInDays: 365      // 1 year interactive
    totalRetentionInDays: 2555 // 7 years total (archive)
  }
}

// Data export to ADX for long-term hunting
resource dataExportRule 'Microsoft.OperationalInsights/workspaces/dataExports@2020-08-01' = {
  parent: workspace
  name: 'export-to-adx'
  properties: {
    destination: {
      resourceId: adxCluster.id
      metaData: {
        eventHubName: 'sentinel-export'
      }
    }
    tableNames: [
      'SecurityEvent'
      'CommonSecurityLog'
      'SigninLogs'
      'AuditLogs'
    ]
    enable: true
  }
}

4. CISA CDM integration

CDM dashboard migration

Many federal agencies use Splunk for CDM (Continuous Diagnostics and Mitigation) dashboard integration. Sentinel supports CDM through:

CDM capability Splunk implementation Sentinel implementation
Asset management CDM Splunk app Sentinel workbook + Defender for Endpoint inventory
Identity management CDM Splunk app Entra ID connector + SigninLogs analytics
Network security CDM Splunk app Network Security workbooks + NSG flow logs
Data protection CDM Splunk app Purview + DLP connectors
CDM Agency Dashboard Splunk Dashboard Sentinel workbook or Power BI (CSA-in-a-Box)

CDM data flow to Sentinel

flowchart LR
    CDM_SENSORS[CDM Sensors] --> CDM_FEED[CDM Data Feed]
    CDM_FEED --> SENTINEL[Microsoft Sentinel]
    SENTINEL --> WORKBOOK[CDM Workbooks]
    SENTINEL --> PBI[Power BI - CSA-in-a-Box]
    SENTINEL --> CISA[CISA CDM Dashboard feed]

5. DoD-specific considerations

DoD SIEM requirements

Requirement Splunk implementation Sentinel implementation
STIG compliance Splunk STIG hardening guide Azure Government STIG baseline
PKI/CAC authentication Splunk SAML with PKI Entra ID with CAC/PIV via certificate-based auth
DISA endpoint agent Splunk UF alongside HBSS/Trellix AMA alongside existing endpoint security
ACAS scan ingestion Splunk ACAS app Custom connector or CEF for vulnerability data
SCCM/Intune compliance Custom app Native Intune connector
Cross-domain solutions Splunk with CDS integration Sentinel with CDS data feed

IL4/IL5 deployment architecture

flowchart TD
    subgraph IL4["Azure Government - IL4"]
        S4[Sentinel Workspace - IL4]
        AMA4[AMA on IL4 endpoints]
        PB4[Playbooks - Logic Apps]
    end

    subgraph IL5["Azure Government - IL5"]
        S5[Sentinel Workspace - IL5]
        AMA5[AMA on IL5 endpoints]
        PB5[Playbooks - Logic Apps]
    end

    subgraph CSA["CSA-in-a-Box Analytics"]
        FAB[Fabric - cross-classification analytics]
        PBI[Power BI - CIO/CISO dashboards]
        ADX[ADX - long-term retention]
    end

    AMA4 --> S4
    AMA5 --> S5
    S4 --> FAB
    S5 --> FAB
    S4 --> ADX
    S5 --> ADX
    FAB --> PBI

IL5 data handling

IL5 data must remain in Azure Government regions that support IL5 workloads. Ensure Log Analytics workspace, ADX cluster, and all data export destinations are in IL5-authorized regions.


6. ATO considerations

Sentinel in the agency SSP

When migrating from Splunk to Sentinel, the agency's System Security Plan (SSP) must be updated:

SSP section Update required
System boundary Add Sentinel workspace, Log Analytics, and data connectors to boundary
Data flow diagrams Update to show data flowing to Azure Government instead of on-prem Splunk
Control implementation Update AU (Audit), SI (System Integrity), IR (Incident Response) controls
Interconnection agreements Update or add ISA/MOU for Azure Government connectivity
Contingency plan Update DR/COOP to reflect cloud-native SIEM architecture
POA&M Track any control gaps during migration as POA&M items

CSA-in-a-Box compliance support

CSA-in-a-Box provides machine-readable compliance matrices that map to Sentinel controls:

CSA-in-a-Box artifact How it supports Sentinel ATO
nist-800-53-rev5.yaml Maps SIEM-related controls (AU, SI, IR) to Azure services including Sentinel
cmmc-2.0-l2.yaml Maps CMMC practices for DIB contractors using Sentinel
hipaa-security-rule.yaml Maps HIPAA audit controls for healthcare agencies
fedramp-moderate.md Narrative guidance for FedRAMP documentation

7. Federal procurement considerations

Contract vehicles for Sentinel

Vehicle Covers Sentinel Notes
Microsoft Enterprise Agreement (EA) Yes Most common federal Microsoft procurement
GSA MAS (Schedule 70) Yes Through authorized Microsoft resellers
NASA SEWP V Yes IT products and services
CIO-CS Yes Cybersecurity products
DoD ESI Yes DoD Enterprise Software Initiative
DISA milCloud Yes Azure Government for DoD

Cost comparison for federal

Splunk federal contracts typically include:

  • Multi-year term licenses with fixed GB/day commitment
  • Splunk ES premium (50-100% on top of base)
  • Splunk SOAR as separate line item
  • Professional services / contractor support

Sentinel federal costs are:

  • Consumption-based (no term commitment required, but commitment tiers offer discounts)
  • No separate ES/SOAR licensing
  • Free Microsoft data sources (significant for M365/Entra/Defender shops)
  • CSA-in-a-Box infrastructure costs for analytics extension

8. Federal migration timeline

Federal SIEM migrations require additional time for compliance documentation, ATO updates, and change management:

Phase Commercial timeline Federal timeline Federal additions
Discovery 2 weeks 3-4 weeks Security control mapping, SSP review
Sentinel deployment 4 weeks 6-8 weeks ATO update, ISA/MOU processing, PKI integration
Detection migration 6 weeks 8-12 weeks STIG compliance validation, CDM alignment
SOAR migration 4 weeks 4-6 weeks Playbook approval through change control
Dashboard migration 4 weeks 4-6 weeks CDM dashboard migration
Parallel run 8 weeks 12-16 weeks Extended parallel for compliance validation
Cutover 4 weeks 4-8 weeks AO sign-off, POA&M closure
Total 28-32 weeks 40-60 weeks

9. IL6 split architecture

For agencies with both unclassified and classified SIEM requirements:

Classification level SIEM Rationale
IL2 (Public) Microsoft Sentinel (Azure Gov) Cloud-native, cost-efficient
IL4 (CUI) Microsoft Sentinel (Azure Gov) Full feature availability
IL5 (CUI/NSS) Microsoft Sentinel (Azure Gov IL5) Most features available
IL6 (Classified/SCI) Splunk Enterprise (on-prem) or alternate Sentinel not available at IL6

Recommendation: Migrate IL2-IL5 workloads to Sentinel. Maintain Splunk (or evaluate alternatives) for IL6. Use CSA-in-a-Box as the analytics layer for unclassified security data, combining Sentinel telemetry with other agency data in Fabric lakehouses.


10. Federal-specific CSA-in-a-Box integration

CSA-in-a-Box provides federal-specific value for security data:

CSA-in-a-Box capability Federal security use case
Purview with government classifications Classify security telemetry as CUI, CUI//SP, PII per government_classifications.yaml
Compliance matrices Automated control mapping for NIST, CMMC, HIPAA, FedRAMP
Tamper-evident audit logging Hash-chained audit trail for security event integrity
Fabric security analytics Cross-domain correlation -- combine Sentinel data with HR, finance, IT asset data
Power BI executive dashboards CIO/CISO-level security posture reporting for FISMA
ADX long-term retention 7-year queryable archive for compliance and forensics

Next steps:


Maintainers: csa-inabox core team Last updated: 2026-04-30