Tanium 7.x Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
The Tanium application must electronically verify Personal Identity Verification (PIV) credentials.
<VulnDiscussion>The use of PIV credentials facilitates standardization and reduces the risk of unauthorized access. DoD has mandated the use...Rule Medium Severity -
SRG-APP-000402
<GroupDescription></GroupDescription>Group -
The Tanium application must accept Personal Identity Verification (PIV) credentials from other federal agencies.
<VulnDiscussion>Access may be denied to authorized users if federal agency PIV credentials are not accepted. PIV credentials are issued by ...Rule Medium Severity -
SRG-APP-000456
<GroupDescription></GroupDescription>Group -
The Tanium application must install security-relevant software updates within the time period directed by an authoritative source (e.g., IAVM, CTOs, DTMs, and STIGs).
<VulnDiscussion>Security flaws with software applications are discovered daily. Vendors are constantly updating and patching their products t...Rule Medium Severity -
SRG-APP-000471
<GroupDescription></GroupDescription>Group -
Tanium must alert the ISSO, ISSM, and other individuals designated by the local organization when the following Indicators of Compromise (IOCs) or potential compromise are detected: real-time intrusion detection; threats identified by authoritative sources (e.g., CTOs); and Category I, II, IV, and VII incidents in accordance with CJCSM 6510.01B.
<VulnDiscussion>When a security event occurs, the application that has detected the event must immediately notify the appropriate support per...Rule Medium Severity -
SRG-APP-000516
<GroupDescription></GroupDescription>Group -
Tanium Server processes must be excluded from On-Access scan.
<VulnDiscussion>Similar to any other host-based applications, the Tanium Server is subject to the restrictions other system-level software ma...Rule Medium Severity -
SRG-APP-000580
<GroupDescription></GroupDescription>Group -
Control of the Tanium Client service must be restricted to SYSTEM access only for all managed clients.
<VulnDiscussion>The reliability of the Tanium client's ability to operate depends on controlling access to the Tanium client service. By rest...Rule Medium Severity -
SRG-APP-000328
<GroupDescription></GroupDescription>Group -
The Tanium application must authenticate endpoint devices (servers) before establishing a local, remote, and/or network connection using bidirectional authentication that is cryptographically based.
<VulnDiscussion>Without authenticating devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. B...Rule Medium Severity -
SRG-APP-000015
<GroupDescription></GroupDescription>Group -
The Tanium endpoint must have the Tanium Server's pki.db in its installation.
<VulnDiscussion>Without cryptographic integrity protections in the Tanium Client, information could be altered by unauthorized users without ...Rule Medium Severity -
SRG-APP-000119
<GroupDescription></GroupDescription>Group -
Access to Tanium logs on each endpoint must be restricted by permissions.
<VulnDiscussion>For the Tanium Client software to run without impact from external negligent or malicious changes, the permissions on the Tan...Rule Medium Severity -
SRG-APP-000131
<GroupDescription></GroupDescription>Group -
The Tanium cryptographic signing capabilities must be enabled on the Tanium Clients to safeguard the authenticity of communications sessions when answering requests from the Tanium Server.
<VulnDiscussion>All of Tanium's signing capabilities should be enabled upon install. Tanium supports the cryptographic signing and verificati...Rule Medium Severity -
SRG-APP-000142
<GroupDescription></GroupDescription>Group
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.