Tanium 7.x Application on TanOS Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
SRG-APP-000416
<GroupDescription></GroupDescription>Group -
The SSLCipherSuite must be configured to disable weak encryption algorithms on the Tanium Server.
<VulnDiscussion>Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to protect data. The applicatio...Rule Medium Severity -
SRG-APP-000427
<GroupDescription></GroupDescription>Group -
The Tanium Server certificate must be signed by a DOD Certificate Authority.
<VulnDiscussion>The Tanium Server has the option to use a "self-signed" certificate or a Trusted Certificate Authority signed certificate for...Rule Medium Severity -
SRG-APP-000435
<GroupDescription></GroupDescription>Group -
The Tanium application must limit the bandwidth used in communicating with endpoints to prevent a denial of service (DoS) condition at the server.
<VulnDiscussion>DoS is a condition when a resource is not available for legitimate users. When this occurs, the organization either cannot ac...Rule Medium Severity -
SRG-APP-000456
<GroupDescription></GroupDescription>Group -
Tanium endpoint files must be excluded from host-based intrusion prevention intervention.
<VulnDiscussion>Similar to any other host-based applications, the Tanium Client is subject to the restrictions other system-level software ma...Rule Medium Severity -
The Tanium application must install security-relevant software updates within the time period directed by an authoritative source (e.g., IAVM, CTOs, DTMs, and STIGs).
<VulnDiscussion>Security flaws with software applications are discovered daily. Vendors are constantly updating and patching their products t...Rule Medium Severity -
SRG-APP-000471
<GroupDescription></GroupDescription>Group -
Tanium must alert the ISSO, ISSM, and other individuals designated by the local organization when the following Indicators of Compromise (IOCs) or potential compromise are detected: real time intrusion detection; threats identified by authoritative sources (e.g., CTOs); and Category I, II, IV, and VII incidents in accordance with CJCSM 6510.01B.
<VulnDiscussion>When a security event occurs, the application that has detected the event must immediately notify the appropriate support per...Rule Medium Severity -
SRG-APP-000515
<GroupDescription></GroupDescription>Group -
The application must, at a minimum, offload interconnected systems in real time and offload standalone systems weekly.
<VulnDiscussion>Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Offloading is a common ...Rule Medium Severity -
SRG-APP-000516
<GroupDescription></GroupDescription>Group -
Tanium Client processes must be excluded from on-access scan.
<VulnDiscussion>Similar to any other host-based applications, the Tanium Client is subject to the restrictions other system-level software ma...Rule Medium Severity -
SRG-APP-000516
<GroupDescription></GroupDescription>Group -
Tanium Client directory and subsequent files must be excluded from on-access scan.
<VulnDiscussion>Similar to any other host-based applications, the Tanium Client is subject to the restrictions other system-level software ma...Rule Medium Severity -
SRG-APP-000516
<GroupDescription></GroupDescription>Group -
SRG-APP-000516
<GroupDescription></GroupDescription>Group -
Tanium Server processes must be excluded from on-access scan.
<VulnDiscussion>Similar to any other host-based applications, the Tanium Server is subject to the restrictions other system-level software ma...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.