Skip to content

Tanium 7.x Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-APP-000515

    Group
  • The application must, at a minimum, offload interconnected systems in real time and offload standalone systems weekly.

    Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Offloading is a common process in information systems with limited audit storage capacity.
    Rule Medium Severity
  • SRG-APP-000516

    Group
  • Tanium Client processes must be excluded from On-Access scan.

    Similar to any other host-based applications, the Tanium Client is subject to the restrictions other system-level software may place on an operating environment. Antivirus, intrusion prevention sys...
    Rule Medium Severity
  • SRG-APP-000177

    Group
  • The Tanium application must be configured for LDAP user/group synchronization to map the authenticated identity to the individual user or group account for PKI-based authentication.

    Without mapping the certificate used to authenticate to the user account, the ability to determine the identity of the individual user or group will not be available for forensic analysis.
    Rule Medium Severity
  • SRG-APP-000180

    Group
  • The Tanium application must provide an immediate warning to the system administrator and information system security officer (at a minimum) when allocated audit record storage volume reaches 75% of repository maximum audit record storage capacity.

    If security personnel are not notified immediately upon storage volume utilization reaching 75%, they are unable to plan for storage capacity expansion.
    Rule Medium Severity
  • SRG-APP-000360

    Group
  • SRG-APP-000211

    Group
  • SRG-APP-000226

    Group
  • The Tanium Server and Client applications must have logging enabled.

    Failure to a known state can address safety or security in accordance with the mission/business needs of the organization. Failure to a known secure state helps prevent a loss of confidentiality, i...
    Rule Medium Severity
  • SRG-APP-000246

    Group
  • The Tanium application must restrict the ability of individuals to use information systems to launch organization-defined denial-of-service (DoS) attacks against other information systems.

    The Tanium Action Approval feature provides a two-person integrity control mechanism designed to achieve a high level of security and reduce the possibility of error for critical operations and DoS...
    Rule Medium Severity
  • SRG-APP-000247

    Group
  • SRG-APP-000378

    Group
  • SRG-APP-000266

    Group
  • The Tanium application must generate error messages that provide information necessary for corrective actions without revealing information that could be exploited by adversaries.

    Any application providing too much information in error messages risks compromising the data and security of the application and system. The structure and content of error messages must be carefull...
    Rule Medium Severity
  • SRG-APP-000267

    Group
  • The Tanium application must reveal error messages only to the information system security officer (ISSO), information system security manager (ISSM), and system administrator (SA).

    Only authorized personnel must be aware of errors and the details of the errors. Error messages are an indicator of an organization's operational state or can identify the application. Additionally...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules