Skip to content

Tanium 7.x Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • Tanium must notify system administrators and the information system security officer (ISSO) for account disabling actions.

    <VulnDiscussion>When application accounts are disabled, user accessibility is affected. Accounts are utilized for identifying individual user...
    Rule Medium Severity
  • SRG-APP-000294

    <GroupDescription></GroupDescription>
    Group
  • Tanium must notify system administrators and the information system security officer (ISSO) for account removal actions.

    &lt;VulnDiscussion&gt;When application accounts are removed, user accessibility is affected. Accounts are utilized for identifying users or for ide...
    Rule Medium Severity
  • SRG-APP-000121

    <GroupDescription></GroupDescription>
    Group
  • The Tanium application must prohibit user installation, modification, or deletion of software without explicit privileged status.

    &lt;VulnDiscussion&gt;Allowing regular users to install, modify, or delete software, without explicit privileges, creates the risk that the applica...
    Rule Medium Severity
  • SRG-APP-000323

    <GroupDescription></GroupDescription>
    Group
  • The Tanium database(s) must be installed on a separate system.

    &lt;VulnDiscussion&gt;Failure to protect organizational information from data mining may result in a compromise of information. Data storage objec...
    Rule Medium Severity
  • SRG-APP-000323

    <GroupDescription></GroupDescription>
    Group
  • The Tanium application database must be dedicated to only the Tanium application.

    &lt;VulnDiscussion&gt;Failure to protect organizational information from data mining may result in a compromise of information. Data storage objec...
    Rule Medium Severity
  • SRG-APP-000381

    <GroupDescription></GroupDescription>
    Group
  • The access to the Tanium SQL database must be restricted. Only the designated database administrator(s) can have elevated privileges to the Tanium SQL database.

    &lt;VulnDiscussion&gt;After the Tanium Server has been installed and the Tanium databases created, only the Tanium Server needs to access the SQL S...
    Rule Medium Severity
  • SRG-APP-000381

    <GroupDescription></GroupDescription>
    Group
  • The Tanium Server installer's account database permissions must be reduced to an appropriate level.

    &lt;VulnDiscussion&gt;Creating the "tanium" and "tanium_archive" databases through the Tanium Server installer program or using the database to cre...
    Rule Medium Severity
  • SRG-APP-000383

    <GroupDescription></GroupDescription>
    Group
  • Firewall rules must be configured on the Tanium Server for server-to-database communications.

    &lt;VulnDiscussion&gt;The Tanium Server can use either a SQL Server relational database management system (RDBMS) installed locally to the same dev...
    Rule Medium Severity
  • SRG-APP-000003

    <GroupDescription></GroupDescription>
    Group
  • The Tanium Application Server console must be configured to initiate a session lock after a 15-minute period of inactivity.

    &lt;VulnDiscussion&gt;When multifactor authentication is enabled, the Tanium Console will initiate a session lock based on the ActivClient or other...
    Rule Medium Severity
  • SRG-APP-000015

    <GroupDescription></GroupDescription>
    Group
  • Tanium Trusted Content providers must be documented.

    &lt;VulnDiscussion&gt;A Tanium Sensor, also called content, enables an organization to gather real-time inventory, configuration, and compliance da...
    Rule Medium Severity
  • SRG-APP-000015

    <GroupDescription></GroupDescription>
    Group
  • Firewall rules must be configured on the Tanium Server for Server-to-Module Server communications.

    &lt;VulnDiscussion&gt;The Tanium Module Server is used to extend the functionality of Tanium through the use of various workbenches. The Tanium Mod...
    Rule Medium Severity
  • SRG-APP-000383

    <GroupDescription></GroupDescription>
    Group
  • Content providers must provide their public key to the Tanium administrator to import for validating signed content.

    &lt;VulnDiscussion&gt;A Tanium Sensor, also called content, enables an organization to gather real-time inventory, configuration, and compliance da...
    Rule Medium Severity
  • SRG-APP-000015

    <GroupDescription></GroupDescription>
    Group
  • Tanium public keys of content providers must be validated against documented trusted content providers.

    &lt;VulnDiscussion&gt;A Tanium Sensor, also called content, enables an organization to gather real-time inventory, configuration, and compliance da...
    Rule Medium Severity
  • SRG-APP-000033

    <GroupDescription></GroupDescription>
    Group
  • The Tanium Action Approval feature must be enabled for two-person integrity when deploying actions to endpoints.

    &lt;VulnDiscussion&gt;The Tanium Action Approval feature provides a two-person integrity control mechanism designed to achieve a high level of secu...
    Rule Medium Severity
  • SRG-APP-000039

    <GroupDescription></GroupDescription>
    Group
  • The Tanium documentation identifying recognized and trusted indicator of compromise (IOC) streams must be maintained.

    &lt;VulnDiscussion&gt;Using trusted and recognized IOC sources may detect compromise and prevent systems from becoming compromised. An IOC stream i...
    Rule Medium Severity
  • SRG-APP-000039

    <GroupDescription></GroupDescription>
    Group
  • Tanium Threat Response must be configured to receive IOC streams only from trusted sources.

    &lt;VulnDiscussion&gt;Using trusted and recognized IOC sources may detect compromise and prevent systems from becoming compromised. An IOC stream i...
    Rule Medium Severity
  • SRG-APP-000115

    <GroupDescription></GroupDescription>
    Group
  • The Tanium applications must be configured to filter audit records for events of interest based on organization-defined criteria.

    &lt;VulnDiscussion&gt;The ability to specify the event criteria that are of interest enables those reviewing the logs to quickly isolate and identi...
    Rule Medium Severity
  • SRG-APP-000131

    <GroupDescription></GroupDescription>
    Group
  • The Tanium cryptographic signing capabilities must be enabled on the Tanium Server.

    &lt;VulnDiscussion&gt;All of Tanium's signing capabilities should be enabled upon install. Tanium supports the cryptographic signing and verificati...
    Rule Medium Severity
  • SRG-APP-000131

    <GroupDescription></GroupDescription>
    Group
  • The Tanium Server must be configured to allow only signed content to be imported.

    &lt;VulnDiscussion&gt;Changes to any software components can have significant effects on the overall security of the application. Verifying softwar...
    Rule Medium Severity
  • SRG-APP-000133

    <GroupDescription></GroupDescription>
    Group
  • All installation files originally downloaded to the Tanium Server must be configured to download to a location other than the Tanium Server directory.

    &lt;VulnDiscussion&gt;Typically, the Tanium Server stores the Package Source Files that it downloads from the internet and server shares or files u...
    Rule Medium Severity
  • SRG-APP-000142

    <GroupDescription></GroupDescription>
    Group
  • Firewall rules must be configured on the Tanium Server for client-to-server communications.

    &lt;VulnDiscussion&gt;In addition to the client-to-server TCP communication that takes place over port 17472, Tanium Clients also communicate to ot...
    Rule Medium Severity
  • SRG-APP-000142

    <GroupDescription></GroupDescription>
    Group
  • Firewall rules must be configured on the Tanium Zone Server for Client-to-Zone Server communications.

    &lt;VulnDiscussion&gt;In customer environments using the Tanium Zone Server, a Tanium Client may be configured to point to a Zone Server instead of...
    Rule Medium Severity
  • SRG-APP-000142

    <GroupDescription></GroupDescription>
    Group
  • The Tanium Application Server must be configured to prohibit or restrict the use of organization-defined functions, ports, protocols, and/or services, as defined in the PPSM Category Assurance List (CAL) and vulnerability assessments.

    &lt;VulnDiscussion&gt;To prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling (i.e., embeddi...
    Rule Medium Severity
  • SRG-APP-000175

    <GroupDescription></GroupDescription>
    Group
  • The Tanium Server certificates must have Extended Key Usage entries for the serverAuth object TLS Web Server Authentication and the clientAuth object TLS Web Client Authentication.

    &lt;VulnDiscussion&gt;Restricting this setting limits the user's ability to change their password. Passwords must be changed at specific policy-bas...
    Rule Medium Severity
  • SRG-APP-000328

    <GroupDescription></GroupDescription>
    Group
  • Firewall rules must be configured on the Tanium Server for Server-to-Zone Server communications.

    &lt;VulnDiscussion&gt;If using the Tanium Zone Server to proxy traffic from Tanium-managed computers on less trusted network segments to the Tanium...
    Rule Medium Severity
  • The Tanium Server directory must be restricted with appropriate permissions.

    &lt;VulnDiscussion&gt;Discretionary Access Control (DAC) is based on the notion that individual users are "owners" of objects and therefore have di...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules