Tanium 7.3 Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
SRG-APP-000414
Group -
The vulnerability scanning application must implement privileged access authorization to all Tanium information systems and infrastructure components for selected organization-defined vulnerability scanning activities.
In certain situations, the nature of the vulnerability scanning may be more intrusive, or the information system component that is the subject of the scanning may contain highly sensitive informati...Rule Medium Severity -
SRG-APP-000015
Group -
The Tanium endpoint must have the Tanium Servers public key in its installation.
Without cryptographic integrity protections, information can be altered by unauthorized users without detection. Remote access is access to DoD nonpublic information systems by an authorized user ...Rule Medium Severity -
SRG-APP-000119
Group -
Access to Tanium logs on each endpoint must be restricted by permissions.
For the Tanium Client software to run without impact from external negligent or malicious changes, the permissions on the Tanium log files and their directory must be restricted. Tanium is deploye...Rule Medium Severity -
SRG-APP-000131
Group -
SRG-APP-000142
Group -
Firewall rules must be configured on the Tanium Endpoints for Client-to-Server communications.
In addition to the client-to-server TCP communication that takes place over port 17472, Tanium Clients also communicate to other Tanium-managed computers over port 17472. The Tanium environment can...Rule Medium Severity -
SRG-APP-000328
Group -
Control of the Tanium Client service must be restricted to SYSTEM access only for all managed clients.
The reliability of the Tanium client's ability to operate depends upon controlling access to the Tanium client service. By restricting access to SYSTEM access only, the non-Tanium system administra...Rule Medium Severity -
SRG-APP-000328
Group -
The ability to uninstall the Tanium Client service must be disabled on all managed clients.
By default, end users have the ability to uninstall software on their clients. In the event the Tanium Client software is uninstalled, the Tanium Server is unable to manage the client and must rede...Rule Medium Severity -
SRG-APP-000328
Group -
The permissions on the Tanium Client directory must be restricted to only the SYSTEM account on all managed clients.
By restricting access to the Tanium Client directory on managed clients, the Tanium client's ability to operate and function as designed will be protected from malicious attack and unintentional mo...Rule Medium Severity -
SRG-APP-000516
Group -
SRG-APP-000516
Group -
Tanium endpoint files must be excluded from host-based intrusion prevention intervention.
Similar to any other host-based applications, the Tanium Client is subject to the restrictions other System-level software may place on an operating environment. Antivirus, IPS, Encryption, or othe...Rule Medium Severity -
SRG-APP-000002
Group -
SRG-APP-000233
Group -
The Tanium Application Server must be configured with a connector to sync to Microsoft Active Directory for account management functions.
By restricting access to the Tanium Server to only Microsoft Active Directory, user accounts and related permissions can be strictly monitored. Account management will be under the operational resp...Rule Medium Severity -
SRG-APP-000023
Group -
The Tanium Application Server must be configured to only use Microsoft Active Directory for account management functions.
By restricting access to the Tanium Server to only Microsoft Active Directory, user accounts and related permissions can be strictly monitored. Account management will be under the operational resp...Rule Medium Severity -
SRG-APP-000033
Group -
Tanium console users Computer Group rights must be validated against the documentation for Computer Group rights.
System access should be reviewed periodically to verify that all Tanium users are assigned the appropriate role, with the least privileged access possible to perform assigned tasks being the recomm...Rule Medium Severity -
SRG-APP-000033
Group -
Documentation identifying Tanium console users, their respective functional roles, and computer groups must be maintained.
System access should be reviewed periodically to verify that all Tanium users are assigned the appropriate functional role, with the least privileged access possible to perform assigned tasks being...Rule Medium Severity -
SRG-APP-000033
Group -
Role-based system access must be configured to least privileged access to Tanium Server functions through the Tanium interface.
User accessibility to various Tanium Server functions performed via the console can be restricted by functional roles, a combination of User Role(s), and Content Set(s) assigned through User Group ...Rule High Severity -
SRG-APP-000033
Group -
Tanium console users User Roles must be validated against the documentation for User Roles.
System access should be reviewed periodically to verify that all Tanium users are assigned the appropriate role, with the least privileged access possible to perform assigned tasks being the recomm...Rule Medium Severity -
SRG-APP-000033
Group -
Documentation identifying Tanium console users and their respective Computer Group rights must be maintained.
System access should be reviewed periodically to verify that all Tanium users are assigned the appropriate role, with the least privileged access possible to perform assigned tasks being the recomm...Rule Medium Severity -
SRG-APP-000033
Group -
SRG-APP-000149
Group -
SRG-APP-000383
Group -
Firewall rules must be configured on the Tanium Server for Console-to-Server communications.
An HTML5 based application, the Tanium Console runs from any device with a browser that supports HTML5. For security, the HTTP and SOAP communication to the Tanium Server is SSL encrypted, so the T...Rule Medium Severity -
SRG-APP-000070
Group -
SRG-APP-000108
Group -
Tanium must alert the ISSO and SA (at a minimum) in the event of an audit processing failure.
It is critical for the appropriate personnel to be aware if a system is at risk of failing to process audit logs as required. Without this notification, the security personnel may be unaware of an ...Rule Medium Severity -
SRG-APP-000270
Group -
SRG-APP-000291
Group -
Tanium must notify SA and ISSO when accounts are created.
Once an attacker establishes initial access to a system, the attacker often attempts to create a persistent method of re-establishing access. One way to accomplish this is for the attacker to simpl...Rule Medium Severity -
SRG-APP-000292
Group -
Tanium must notify SA and ISSO when accounts are modified.
Once an attacker establishes initial access to a system, the attacker often attempts to create a persistent method of re-establishing access. One way to accomplish this is for the attacker to simpl...Rule Medium Severity -
SRG-APP-000320
Group -
The Tanium application must notify SA and ISSO of account enabling actions.
Once an attacker establishes initial access to a system, the attacker often attempts to create a persistent method of re-establishing access. One way to accomplish this is for the attacker to simpl...Rule Medium Severity -
SRG-APP-000359
Group -
SRG-APP-000148
Group -
SRG-APP-000293
Group
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.