Tanium 7.0 Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
Tanium must be configured to communicate using TLS 1.2 Strict Only.
Without protection of the transmitted information, confidentiality and integrity may be compromised since unprotected communications can be intercepted and either read or altered. This requirement...Rule Medium Severity -
Tanium must be configured to communicate using TLS 1.2 Strict Only.
Without protection of the transmitted information, confidentiality and integrity may be compromised since unprotected communications can be intercepted and either read or altered. This requirement...Rule Medium Severity -
Tanium must be configured to communicate using TLS 1.2 Strict Only.
Without protection of the transmitted information, confidentiality and integrity may be compromised since unprotected communications can be intercepted and either read or altered. This requirement...Rule Medium Severity -
Tanium must be configured to communicate using TLS 1.2 Strict Only.
Without protection of the transmitted information, confidentiality and integrity may be compromised since unprotected communications can be intercepted and either read or altered. This requirement...Rule Medium Severity -
The SSLCipherSuite must be configured to disable weak encryption algorithms on the Tanium Server.
Use of weak or untested encryption algorithms undermines the purposes of using encryption to protect data. The application must implement cryptographic modules adhering to the higher standards appr...Rule Medium Severity -
Access to Tanium logs on each endpoint must be restricted by permissions.
For the Tanium Client software to run without impact from external negligent or malicious changes, the permissions on the Tanium log files and their directory must be restricted. Tanium is deploye...Rule Medium Severity -
SRG-APP-000131
Group -
SRG-APP-000015
Group -
The Tanium endpoint must have the Tanium Servers public key in its installation, which will allow it to authenticate and uniquely identify all network-connected endpoint devices before establishing any connection.
Without cryptographic integrity protections, information can be altered by unauthorized users without detection. Without identifying devices, unidentified or unknown devices may be introduced, ther...Rule Medium Severity -
SRG-APP-000119
Group -
SRG-APP-000142
Group -
Firewall rules must be configured on the Tanium Endpoints for Client-to-Server communications.
In addition to the client-to-server TCP communication that takes place over port 17472, Tanium Clients also communicate to other Tanium-managed computers over port 17472. The Tanium environment can...Rule Medium Severity -
SRG-APP-000328
Group -
Control of the Tanium Client service must be restricted to SYSTEM access only for all managed clients.
The reliability of the Tanium client's ability to operate depends upon controlling access to the Tanium client service. By restricting access to SYSTEM access only, the non-Tanium system administra...Rule Medium Severity -
SRG-APP-000328
Group -
The ability to uninstall the Tanium Client service must be disabled on all managed clients.
By default, end users have the ability to uninstall software on their clients. In the event the Tanium Client software is uninstalled, the Tanium Server is unable to manage the client and must rede...Rule Medium Severity -
SRG-APP-000328
Group -
The permissions on the Tanium Client directory must be restricted to only the SYSTEM account on all managed clients.
By restricting access to the Tanium Client directory on managed clients, the Tanium client's ability to operate and function as designed will be protected from malicious attack and unintentional mo...Rule Medium Severity -
SRG-APP-000516
Group -
SRG-APP-000516
Group -
The Tanium Client Deployment Tool (CDT) must not be configured to use the psexec method of deployment.
When using the Tanium Client Deployment Tool (CDT), using psexec represents an increased vulnerability as the NTLM hash and clear text passwords of the authenticating user is exposed in the memory ...Rule Medium Severity -
SRG-APP-000516
Group -
Tanium endpoint files must be protected from file encryption actions.
Similar to any other host-based applications, the Tanium Client is subject to the restrictions other System-level software may place on an operating environment. That is to say that Antivirus, Encr...Rule Medium Severity -
SRG-APP-000246
Group -
SRG-APP-000516
Group -
Tanium endpoint files must be excluded from host-based intrusion prevention intervention.
Similar to any other host-based applications, the Tanium Client is subject to the restrictions other System-level software may place on an operating environment. Antivirus, IPS, Encryption, or othe...Rule Medium Severity -
SRG-APP-000023
Group -
SRG-APP-000023
Group -
The Tanium Server must be configured to only use Microsoft Active Directory for account management functions.
By restricting access to the Tanium Server to only Microsoft Active Directory, user accounts and related permissions can be strictly monitored. Account management will be under the operational resp...Rule Medium Severity -
SRG-APP-000033
Group -
Tanium Computer Groups must be used to restrict console users from affecting changes to unauthorized computers.
Computer Groups allow a site running Tanium to assign responsibility of specific Computer Groups to specific Tanium console users. By doing so, a desktop administrator, for example, will not have t...Rule Medium Severity -
SRG-APP-000033
Group -
Documentation identifying Tanium console users and their respective User Roles must be maintained.
System access should be reviewed periodically to verify that all Tanium users are assigned the appropriate role, with the least privileged access possible to perform assigned tasks being the recomm...Rule Medium Severity -
SRG-APP-000033
Group -
Role-based system access must be configured to least privileged access to Tanium Server functions through the Tanium interface.
User accessibility to various Tanium Server functions performed via the console can be restricted by User Roles. Those User Roles are: Administrator, Read Only User, Question Author, Action User, A...Rule High Severity -
SRG-APP-000033
Group -
SRG-APP-000033
Group -
Documentation identifying Tanium console users and their respective Computer Group rights must be maintained.
System access should be reviewed periodically to verify that all Tanium users are assigned the appropriate role, with the least privileged access possible to perform assigned tasks being the recomm...Rule Medium Severity -
SRG-APP-000033
Group -
Tanium console users Computer Group rights must be validated against the documentation for Computer Group rights.
System access should be reviewed periodically to verify that all Tanium users are assigned the appropriate role, with the least privileged access possible to perform assigned tasks being the recomm...Rule Medium Severity -
SRG-APP-000149
Group -
SRG-APP-000383
Group -
Firewall rules must be configured on the Tanium Server for Console-to-Server communications.
An HTML5 based application, the Tanium Console runs from any device with a browser that supports HTML5. For security, the HTTP and SOAP communication to the Tanium Server is SSL encrypted, so the T...Rule Medium Severity -
SRG-APP-000070
Group -
SRG-APP-000108
Group -
Tanium must alert the ISSO and SA (at a minimum) in the event of an audit processing failure.
It is critical for the appropriate personnel to be aware if a system is at risk of failing to process audit logs as required. Without this notification, the security personnel may be unaware of an ...Rule Medium Severity -
SRG-APP-000270
Group -
SRG-APP-000291
Group -
Tanium must notify system administrators and ISSO when accounts are created.
Once an attacker establishes initial access to a system, the attacker often attempts to create a persistent method of re-establishing access. One way to accomplish this is for the attacker to simpl...Rule Medium Severity -
SRG-APP-000292
Group
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.