Skip to content

I - Mission Critical Public

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000177

    Group
  • The Tanium application must be configured for LDAP user/group synchronization to map the authenticated identity to the individual user or group account for PKI-based authentication.

    Without mapping the certificate used to authenticate to the user account, the ability to determine the identity of the individual user or group will not be available for forensic analysis.
    Rule Medium Severity
  • SRG-APP-000180

    Group
  • The Tanium application must uniquely identify and authenticate nonorganizational users (or processes acting on behalf of nonorganizational users).

    Lack of authentication and identification enables nonorganizational users to gain access to the application or possibly other information systems and provides an opportunity for intruders to compro...
    Rule Medium Severity
  • SRG-APP-000211

    Group
  • The Tanium application must separate user functionality (including user interface services) from information system management functionality.

    Application management functionality includes functions necessary for administration and requires privileged user access. Allowing nonprivileged users to access application management functionality...
    Rule Medium Severity
  • SRG-APP-000226

    Group
  • The Tanium Server and Client applications must have logging enabled.

    Failure to a known state can address safety or security in accordance with the mission/business needs of the organization. Failure to a known secure state helps prevent a loss of confidentiality, i...
    Rule Medium Severity
  • SRG-APP-000246

    Group
  • The Tanium application must restrict the ability of individuals to use information systems to launch organization-defined Denial of Service (DoS) attacks against other information systems.

    The Tanium Action Approval feature provides a two-person integrity control mechanism designed to achieve a high-level of security and reduce the possibility of error for critical operations and DoS...
    Rule Medium Severity
  • SRG-APP-000247

    Group
  • The Tanium application must manage bandwidth throttles to limit the effects of information flooding types of Denial of Service (DoS) attacks.

    DoS is a condition when a resource is not available for legitimate users. When this occurs, the organization either cannot accomplish its mission or must operate at degraded capacity. In the case...
    Rule Medium Severity
  • SRG-APP-000267

    Group
  • The Tanium application must reveal error messages only to the ISSO, ISSM, and SA.

    Only authorized personnel should be aware of errors and the details of the errors. Error messages are an indicator of an organization's operational state or can identify the application. Additional...
    Rule Medium Severity
  • SRG-APP-000270

    Group
  • The Tanium application must employ automated mechanisms to determine the state of information system components with regard to flaw remediation using the following frequency: Continuously, where ESS is used; 30 days, for any additional internal network scans not covered by ESS; and annually, for external scans by Computer Network Defense Service Provider (CNDSP).

    Without the use of automated mechanisms to scan for security flaws on a continuous and/or periodic basis, the system components may remain vulnerable to the exploits presented by undetected softwar...
    Rule Medium Severity
  • SRG-APP-000291

    Group
  • Tanium must notify SA and ISSO when accounts are created.

    Once an attacker establishes initial access to a system, the attacker often attempts to create a persistent method of re-establishing access. One way to accomplish this is for the attacker to simpl...
    Rule Medium Severity
  • SRG-APP-000292

    Group
  • Tanium must notify system administrators and ISSO when accounts are modified.

    When application accounts are modified, user accessibility is affected. Accounts are utilized for identifying individual users or for identifying the application processes themselves. Sending notif...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules