Skip to content

Tanium 7.3 Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • Tanium Comply must be configured to receive SCAP content only from trusted sources.

    NIST-validated SCAP XML documents are provided from several possible sources such as DISA, NIST, and the other non-government entities. These documents are used as the basis of compliance definitio...
    Rule Medium Severity
  • SRG-APP-000039

    Group
  • Tanium Comply must be configured to receive OVAL feeds only from trusted sources.

    OVAL XML documents are provided from several possible sources such as the CIS open source repository, or any number of vendor/3rd party paid repositories. These documents are used to automate the p...
    Rule Medium Severity
  • SRG-APP-000226

    Group
  • SRG-APP-000357

    Group
  • The Tanium SQL Server RDBMS must be configured with sufficient free space to ensure audit logging is not impacted.

    In order to ensure Tanium has sufficient storage capacity in which to write the audit logs, the SQL Server RDMBS must be configured with sufficient free space. Consult the server sizing documents ...
    Rule Medium Severity
  • SRG-APP-000435

    Group
  • The Tanium application must limit the bandwidth used in communicating with endpoints to prevent a Denial of Service (DoS) condition at the server.

    DoS is a condition when a resource is not available for legitimate users. When this occurs, the organization either cannot accomplish its mission or must operate at degraded capacity. This require...
    Rule Medium Severity
  • SRG-APP-000456

    Group
  • The Tanium Application Server must install security-relevant software updates within the time period directed by an authoritative source (e.g., IAVM, CTOs, DTMs, and STIGs).

    Security flaws with software applications are discovered daily. Vendors are constantly updating and patching their products to address newly discovered security vulnerabilities. Organizations (incl...
    Rule Medium Severity
  • SRG-APP-000516

    Group
  • Tanium Server files must be excluded from host-based intrusion prevention intervention.

    Similar to any other host-based applications, the Tanium Server is subject to the restrictions other System-level software may place on an operating environment. Antivirus, IPS, Encryption, or othe...
    Rule Medium Severity
  • SRG-APP-000295

    Group
  • SRG-APP-000295

    Group
  • The Tanium application must set an inactive timeout for sessions.

    Leaving sessions open indefinitely is a major security risk. An attacker can easily use an already authenticated session to access the hosted application as the previously authenticated user. By cl...
    Rule Medium Severity
  • SRG-APP-000435

    Group
  • SRG-APP-000435

    Group
  • The Tanium web server must be tuned to handle the operational requirements of the hosted application.

    DoS is a condition when a resource is not available for legitimate users. When this occurs, the organization either cannot accomplish its mission or must operate at degraded capacity. This require...
    Rule Medium Severity
  • SRG-APP-000439

    Group
  • The Tanium application, SQL and Module servers must all be configured to communicate using TLS 1.2 Strict Only.

    Without protection of the transmitted information, confidentiality and integrity may be compromised since unprotected communications can be intercepted and either read or altered. This requirement...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules