Tanium 7.3 Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
Firewall rules must be configured on the Tanium Server for Client-to-Server communications.
<VulnDiscussion>In addition to the client-to-server TCP communication that takes place over port 17472, Tanium Clients also communicate to ot...Rule Medium Severity -
SRG-APP-000142
<GroupDescription></GroupDescription>Group -
Firewall rules must be configured on the Tanium Zone Server for Client-to-Zone Server communications.
<VulnDiscussion>In customer environments using the Tanium Zone Server, a Tanium Client may be configured to point to a Zone Server instead of...Rule Medium Severity -
SRG-APP-000142
<GroupDescription></GroupDescription>Group -
The Tanium Application Server must be configured to prohibit or restrict the use of organization-defined functions, ports, protocols, and/or services, as defined in the PPSM CAL and vulnerability assessments.
<VulnDiscussion>In order to prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling (i.e....Rule Medium Severity -
SRG-APP-000175
<GroupDescription></GroupDescription>Group -
The Tanium Server certificates must have Extended Key Usage entries for the serverAuth object TLS Web Server Authentication and the clientAuth object TLS Web Client Authentication.
<VulnDiscussion>Information can be either unintentionally or maliciously disclosed or modified during reception including, for example, durin...Rule Medium Severity -
SRG-APP-000176
<GroupDescription></GroupDescription>Group -
The Tanium Server certificate and private/public keys directory must be protected with appropriate permissions.
<VulnDiscussion>If the private key is discovered, an attacker can use the key to authenticate as an authorized user and gain access to the ne...Rule High Severity -
The Tanium Module server must be installed on a separate system.
<VulnDiscussion>Unauthorized access to the Tanium Server is protected by disabling the Module Server service on the Tanium Server and by conf...Rule Medium Severity -
SRG-APP-000328
<GroupDescription></GroupDescription>Group -
The Tanium Server directory must be restricted with appropriate permissions.
<VulnDiscussion>Discretionary Access Control (DAC) is based on the notion that individual users are "owners" of objects and therefore have di...Rule Medium Severity -
SRG-APP-000328
<GroupDescription></GroupDescription>Group -
The Tanium Server http directory and sub-directories must be restricted with appropriate permissions.
<VulnDiscussion>Discretionary Access Control (DAC) is based on the notion that individual users are "owners" of objects and therefore have di...Rule Medium Severity -
SRG-APP-000328
<GroupDescription></GroupDescription>Group -
The permissions on the Tanium Server registry keys must be restricted to only the Tanium service account and the [Tanium Admins] group.
<VulnDiscussion>Discretionary Access Control (DAC) is based on the notion that individual users are "owners" of objects and therefore have di...Rule Medium Severity -
SRG-APP-000328
<GroupDescription></GroupDescription>Group -
The Tanium Server Logs and TDL_Logs directories must be restricted with appropriate permissions.
<VulnDiscussion>Discretionary Access Control (DAC) is based on the notion that individual users are "owners" of objects and therefore have di...Rule Medium Severity -
All Active Directory accounts synchronized with Tanium for non-privileged functions must be non-privileged domain accounts.
<VulnDiscussion>Tanium has the ability to synchronize with Active Directory for Tanium account management. Tanium advises that all replicated...Rule Medium Severity -
SRG-APP-000358
<GroupDescription></GroupDescription>Group
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.