Skip to content

Tanium 7.3 Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • The Tanium enterprise audit log reduction option must be configured to provide alerts based off Tanium audit data.

    It is critical for the appropriate personnel to be aware if a system is at risk of failing to process audit logs as required. Without a real-time alert, security personnel may be unaware of an impe...
    Rule Medium Severity
  • Common Access Card (CAC)-based authentication must be enabled and enforced on the Tanium Server for all access and all accounts.

    To assure accountability and prevent unauthenticated access, organizational users must be identified and authenticated to prevent potential misuse and compromise of the system. Organizational user...
    Rule Medium Severity
  • The Tanium application must prohibit user installation of software without explicit privileged status.

    Allowing regular users to install software, without explicit privileges, creates the risk that untested or potentially malicious software will be installed on the system. Explicit privileges (escal...
    Rule Medium Severity
  • The Tanium Server installers account database permissions must be reduced to an appropriate level.

    Creating the tanium and tanium_archive databases through the Tanium Server installer program or using the database create SQL scripts requires Sysadmin-level permissions. Once the databases have be...
    Rule Medium Severity
  • Tanium Trusted Content providers must be documented.

    A Tanium Sensor, also called content, enables an organization to gather real-time inventory, configuration, and compliance data elements from managed computers. Sensors gather specific information ...
    Rule Medium Severity
  • Content providers must provide their public key to the Tanium administrator to import for validating signed content.

    A Tanium Sensor, also called content, enables an organization to gather real-time inventory, configuration, and compliance data elements from managed computers. Sensors gather specific information ...
    Rule Medium Severity
  • The Tanium Detect must be configured to receive IOC streams only from trusted sources.

    An IOC stream is a series or stream of intel that are imported from a vendor based on a subscription service or manually downloaded and placed in a folder. Detect can be configured to retrieve the ...
    Rule Medium Severity
  • The Tanium cryptographic signing capabilities must be enabled on the Tanium Server.

    All of Tanium's signing capabilities should be enabled upon install. Tanium supports the cryptographic signing and verification before execution of all Sensors, Questions, Actions, Sensor Libraries...
    Rule Medium Severity
  • Firewall rules must be configured on the Tanium Server for Client-to-Server communications.

    In addition to the client-to-server TCP communication that takes place over port 17472, Tanium Clients also communicate to other Tanium-managed computers over port 17472. The Tanium environment can...
    Rule Medium Severity
  • The Tanium Application Server must be configured to prohibit or restrict the use of organization-defined functions, ports, protocols, and/or services, as defined in the PPSM CAL and vulnerability assessments.

    In order to prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling (i.e., embedding of data types within data types), organizations must disable...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules