Tanium 7.x Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
SRG-APP-000033
Group -
SRG-APP-000033
Group -
Documentation identifying Tanium console users, their respective User Groups, Computer Groups, and Roles must be maintained.
System access should be reviewed periodically to verify that all Tanium users are assigned the appropriate functional role, with the least privileged access possible to perform assigned tasks being...Rule Medium Severity -
SRG-APP-000033
Group -
The Tanium application must be configured to use Tanium User Groups in a manner consistent with the model outlined in the environment's system documentation.
It is important for information system owners to document authorized User Groups for the Tanium application to avoid unauthorized access to systems. Misaligned implementation of User Groups grants ...Rule Medium Severity -
SRG-APP-000033
Group -
Documentation identifying Tanium console users and their respective Computer Group rights must be maintained.
System access should be reviewed periodically to verify all Tanium users are assigned the appropriate computer groups, with the least privileged access possible to perform assigned tasks. Users who...Rule Medium Severity -
SRG-APP-000149
Group -
SRG-APP-000068
Group -
SRG-APP-000108
Group -
The Tanium application must alert the information system security officer and system administrator (at a minimum) in the event of an audit processing failure.
It is critical for the appropriate personnel to be aware if a system is at risk of failing to process audit logs as required. Without this notification, the security personnel may be unaware of an ...Rule Medium Severity -
SRG-APP-000291
Group -
Tanium must notify system administrator and information system security officer (ISSO) when accounts are created.
Once an attacker establishes initial access to a system, the attacker often attempts to create a persistent method of reestablishing access. One way to accomplish this is for the attacker to create...Rule Medium Severity -
SRG-APP-000292
Group -
SRG-APP-000320
Group -
SRG-APP-000148
Group -
Multifactor authentication must be enabled and enforced on the Tanium Server for all access and all accounts.
To ensure accountability and prevent unauthenticated access, organizational users must be identified and authenticated to prevent potential misuse and compromise of the system. Organizational user...Rule Medium Severity -
SRG-APP-000293
Group -
Tanium must notify system administrators and the information system security officer (ISSO) for account disabling actions.
When application accounts are disabled, user accessibility is affected. Accounts are utilized for identifying individual users or for identifying the application processes. Sending notification of ...Rule Medium Severity -
SRG-APP-000294
Group -
SRG-APP-000121
Group -
The Tanium application must prohibit user installation, modification, or deletion of software without explicit privileged status.
Allowing regular users to install, modify, or delete software, without explicit privileges, creates the risk that the application performs in a manner inconsistent with its design. Explicit privile...Rule Medium Severity -
SRG-APP-000323
Group -
The Tanium database(s) must be installed on a separate system.
Failure to protect organizational information from data mining may result in a compromise of information. Data storage objects include, for example, databases, database records, and database field...Rule Medium Severity -
SRG-APP-000323
Group -
The Tanium application database must be dedicated to only the Tanium application.
Failure to protect organizational information from data mining may result in a compromise of information. Data storage objects include, for example, databases, database records, and database field...Rule Medium Severity -
SRG-APP-000381
Group -
The access to the Tanium SQL database must be restricted. Only the designated database administrator(s) can have elevated privileges to the Tanium SQL database.
After the Tanium Server has been installed and the Tanium databases created, only the Tanium Server needs to access the SQL Server database.Rule Medium Severity -
SRG-APP-000381
Group -
SRG-APP-000383
Group -
SRG-APP-000003
Group -
The Tanium Application Server console must be configured to initiate a session lock after a 15-minute period of inactivity.
When multifactor authentication is enabled, the Tanium Console will initiate a session lock based on the ActivClient or other smartcard software. By initiating the session lock, the console will ...Rule Medium Severity -
SRG-APP-000015
Group -
Tanium Trusted Content providers must be documented.
A Tanium Sensor, also called content, enables an organization to gather real-time inventory, configuration, and compliance data elements from managed computers. Sensors gather specific information ...Rule Medium Severity -
SRG-APP-000015
Group -
Firewall rules must be configured on the Tanium Server for Server-to-Module Server communications.
The Tanium Module Server is used to extend the functionality of Tanium through the use of various workbenches. The Tanium Module Server requires communication with the Tanium Server on port 17477. ...Rule Medium Severity -
SRG-APP-000383
Group -
SRG-APP-000015
Group -
Tanium public keys of content providers must be validated against documented trusted content providers.
A Tanium Sensor, also called content, enables an organization to gather real-time inventory, configuration, and compliance data elements from managed computers. Sensors gather specific information ...Rule Medium Severity -
SRG-APP-000033
Group -
The Tanium Action Approval feature must be enabled for two-person integrity when deploying actions to endpoints.
The Tanium Action Approval feature provides a two-person integrity control mechanism designed to achieve a high level of security and reduce the possibility of error for critical operations. When ...Rule Medium Severity -
SRG-APP-000039
Group -
The Tanium documentation identifying recognized and trusted indicator of compromise (IOC) streams must be maintained.
Using trusted and recognized IOC sources may detect compromise and prevent systems from becoming compromised. An IOC stream is a series or stream of IOCs that are imported from a vendor based on a ...Rule Medium Severity -
SRG-APP-000039
Group -
Tanium Threat Response must be configured to receive IOC streams only from trusted sources.
Using trusted and recognized IOC sources may detect compromise and prevent systems from becoming compromised. An IOC stream is a series or stream of intel that is imported from a vendor based on a ...Rule Medium Severity -
SRG-APP-000115
Group -
SRG-APP-000131
Group -
SRG-APP-000131
Group -
The Tanium Server must be configured to allow only signed content to be imported.
Changes to any software components can have significant effects on the overall security of the application. Verifying software components have been digitally signed using a certificate that is reco...Rule Medium Severity -
SRG-APP-000133
Group
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.