Tanium 7.3 Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
A Tanium connector must be configured to send log data to an external audit log reduction capable system.
While the Tanium Server records audit log entries to the Tanium SQL database, retrieval and aggregation of log data through the Tanium console is not efficient. The Tanium Connect module allows fo...Rule Medium Severity -
SRG-APP-000377
Group -
File integrity monitoring of critical executables that Tanium uses must be configured.
Tanium inherently watches files and their respective hash values for change but while Tanium can do file integrity checks of critical executables, it is important to conduct File Integrity Monitori...Rule Medium Severity -
SRG-APP-000383
Group -
Firewall rules must be configured on the Tanium module server to allow Server-to-Module Server communications from the Tanium Server.
The Tanium Module Server is used to extend the functionality of Tanium through the use of various workbenches. The Tanium Module Server requires communication with the Tanium Server on port 17477. ...Rule Medium Severity -
SRG-APP-000383
Group -
Firewall rules must be configured on the Tanium Server for Server-to-Module Server communications.
The Tanium Module Server is used to extend the functionality of Tanium through the use of various workbenches. The Tanium Module Server requires communication with the Tanium Server on port 17477. ...Rule Medium Severity -
SRG-APP-000383
Group -
Firewall rules must be configured on the Tanium Server for Server-to-Zone Server communications.
If you are using the Tanium Zone Server to proxy traffic from Tanium-managed computers on less trusted network segments to the Tanium Server on the core network, then the Tanium Zone Server Hub, ty...Rule Medium Severity -
SRG-APP-000416
Group -
SRG-APP-000427
Group -
The Tanium Server certificate must be signed by a DoD Certificate Authority.
The Tanium Server has the option to use a "self-signed" certificate or a Trusted Certificate Authority signed certificate for SSL connections. During evaluations of Tanium in Lab settings, customer...Rule Medium Severity -
SRG-APP-000442
Group -
Any Tanium configured EMAIL RESULTS connectors must be configured to enable TLS/SSL to encrypt communications.
Information can be either unintentionally or maliciously disclosed or modified during preparation for transmission including, for example, during aggregation, at protocol transformation points, and...Rule Medium Severity -
SRG-APP-000516
Group -
Tanium Server files must be excluded from on-access antivirus actions.
Similar to any other host-based applications, the Tanium Server is subject to the restrictions other System-level software may place on an operating environment. Antivirus, IPS, Encryption, or othe...Rule Medium Severity -
SRG-APP-000516
Group -
Tanium Server files must be protected from file encryption actions.
Similar to any other host-based applications, the Tanium Server is subject to the restrictions other System-level software may place on an operating environment. Antivirus, Encryption, or other sec...Rule Medium Severity -
SRG-APP-000416
Group -
SRG-APP-000001
Group -
SRG-APP-000001
Group -
The Tanium max_soap_sessions_per_user setting must be explicitly enabled to limit the number of simultaneous sessions.
Application management includes the ability to control the number of users and user sessions that utilize an application. Limiting the number of allowed users and sessions per user is helpful in li...Rule Medium Severity -
SRG-APP-000001
Group -
SRG-APP-000039
Group -
The Tanium documentation identifying recognized and trusted folders for Detect Local Directory Source must be maintained.
An IOC stream is a series or "stream" of IOCs that are imported from a vendor based on a subscription service or manually downloaded and placed in a folder. Detect can be configured to retrieve the...Rule Medium Severity -
SRG-APP-000039
Group -
SRG-APP-000039
Group -
SRG-APP-000039
Group -
The Tanium documentation identifying recognized and trusted OVAL feeds must be maintained.
OVAL XML documents are provided from several possible sources such as the CIS open source repository, or any number of vendor/3rd party paid repositories. These documents are used to automate the p...Rule Medium Severity -
SRG-APP-000039
Group -
Tanium Comply must be configured to receive SCAP content only from trusted sources.
NIST-validated SCAP XML documents are provided from several possible sources such as DISA, NIST, and the other non-government entities. These documents are used as the basis of compliance definitio...Rule Medium Severity -
SRG-APP-000039
Group -
Tanium Comply must be configured to receive OVAL feeds only from trusted sources.
OVAL XML documents are provided from several possible sources such as the CIS open source repository, or any number of vendor/3rd party paid repositories. These documents are used to automate the p...Rule Medium Severity -
SRG-APP-000226
Group -
SRG-APP-000357
Group -
The Tanium SQL Server RDBMS must be configured with sufficient free space to ensure audit logging is not impacted.
In order to ensure Tanium has sufficient storage capacity in which to write the audit logs, the SQL Server RDMBS must be configured with sufficient free space. Consult the server sizing documents ...Rule Medium Severity -
SRG-APP-000435
Group -
The Tanium application must limit the bandwidth used in communicating with endpoints to prevent a Denial of Service (DoS) condition at the server.
DoS is a condition when a resource is not available for legitimate users. When this occurs, the organization either cannot accomplish its mission or must operate at degraded capacity. This require...Rule Medium Severity -
SRG-APP-000456
Group -
The Tanium Application Server must install security-relevant software updates within the time period directed by an authoritative source (e.g., IAVM, CTOs, DTMs, and STIGs).
Security flaws with software applications are discovered daily. Vendors are constantly updating and patching their products to address newly discovered security vulnerabilities. Organizations (incl...Rule Medium Severity -
SRG-APP-000516
Group -
Tanium Server files must be excluded from host-based intrusion prevention intervention.
Similar to any other host-based applications, the Tanium Server is subject to the restrictions other System-level software may place on an operating environment. Antivirus, IPS, Encryption, or othe...Rule Medium Severity -
SRG-APP-000295
Group -
SRG-APP-000295
Group -
The Tanium application must set an inactive timeout for sessions.
Leaving sessions open indefinitely is a major security risk. An attacker can easily use an already authenticated session to access the hosted application as the previously authenticated user. By cl...Rule Medium Severity -
SRG-APP-000435
Group -
SRG-APP-000435
Group -
The Tanium web server must be tuned to handle the operational requirements of the hosted application.
DoS is a condition when a resource is not available for legitimate users. When this occurs, the organization either cannot accomplish its mission or must operate at degraded capacity. This require...Rule Medium Severity -
SRG-APP-000439
Group -
The Tanium application, SQL and Module servers must all be configured to communicate using TLS 1.2 Strict Only.
Without protection of the transmitted information, confidentiality and integrity may be compromised since unprotected communications can be intercepted and either read or altered. This requirement...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.