Skip to content

II - Mission Support Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000293

    Group
  • Tanium must notify system administrators and ISSO for account disabling actions.

    When application accounts are disabled, user accessibility is affected. Accounts are utilized for identifying individual users or for identifying the application processes themselves. Sending notif...
    Rule Medium Severity
  • SRG-APP-000294

    Group
  • Tanium must notify system administrators and ISSO for account removal actions.

    When application accounts are removed, user accessibility is affected. Accounts are utilized for identifying users or for identifying the application processes themselves. Sending notification of a...
    Rule Medium Severity
  • SRG-APP-000295

    Group
  • The Tanium application must set an inactive timeout for sessions.

    Leaving sessions open indefinitely is a major security risk. An attacker can easily use an already authenticated session to access the hosted application as the previously authenticated user. By cl...
    Rule Medium Severity
  • SRG-APP-000317

    Group
  • The Tanium Application Server must be configured with a connector to sync to Microsoft Active Directory for account management functions.

    By restricting access to the Tanium Server to only Microsoft Active Directory, user accounts and related permissions can be strictly monitored. Account management will be under the operational resp...
    Rule Medium Severity
  • SRG-APP-000320

    Group
  • Tanium must notify system administrator and ISSO of account enabling actions.

    Once an attacker establishes access to an application, the attacker often attempts to create a persistent method of re-establishing access. One way to accomplish this is for the attacker to simply ...
    Rule Medium Severity
  • SRG-APP-000328

    Group
  • Control of the Tanium Client service must be restricted to SYSTEM access only for all managed clients.

    The reliability of the Tanium client's ability to operate depends upon controlling access to the Tanium client service. By restricting access to SYSTEM access only, the non-Tanium system administra...
    Rule Medium Severity
  • SRG-APP-000328

    Group
  • The ability to uninstall the Tanium Client service must be disabled on all managed clients.

    By default, end users have the ability to uninstall software on their clients. In the event the Tanium Client software is uninstalled, the Tanium Server is unable to manage the client and must rede...
    Rule Medium Severity
  • SRG-APP-000328

    Group
  • The permissions on the Tanium Client directory must be restricted to only the SYSTEM account on all managed clients.

    By restricting access to the Tanium Client directory on managed clients, the Tanium client's ability to operate and function as designed will be protected from malicious attack and unintentional mo...
    Rule Medium Severity
  • SRG-APP-000357

    Group
  • The Tanium application must allocate audit record storage capacity in accordance with organization-defined audit record storage requirements.

    In order to ensure applications have a sufficient storage capacity in which to write the audit logs, applications need to be able to allocate audit record storage capacity. The task of allocating...
    Rule Medium Severity
  • SRG-APP-000358

    Group
  • The Tanium application must offload audit records onto a different system or media than the system being audited.

    Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Offloading is a common process in information systems with limited audit storage capacity.
    Rule Medium Severity
  • SRG-APP-000359

    Group
  • The Tanium application must provide an immediate warning to the SA and ISSO (at a minimum) when allocated audit record storage volume reaches 75 percent of repository maximum audit record storage capacity.

    If security personnel are not notified immediately upon storage volume utilization reaching 75 percent, they are unable to plan for storage capacity expansion.
    Rule Medium Severity
  • SRG-APP-000360

    Group
  • The Tanium application must provide an immediate real-time alert to the SA and ISSO, at a minimum, of all audit failure events requiring real-time alerts.

    It is critical for the appropriate personnel to be aware if a system is at risk of failing to process audit logs as required. Without a real-time alert, security personnel may be unaware of an impe...
    Rule Medium Severity
  • SRG-APP-000377

    Group
  • Access to the Tanium Application Servers must be restricted. Only the designated administrator(s) can have elevated privileges to the Tanium Application Servers.

    Unauthorized software not only increases risk by increasing the number of potential vulnerabilities, it also can contain malicious code. Sending an alert (in real time) when unauthorized software i...
    Rule Low Severity
  • SRG-APP-000378

    Group
  • The Tanium application must prohibit user installation of software without explicit privileged status.

    Allowing regular users to install software without explicit privileges creates the risk that untested or potentially malicious software will be installed on the system. Explicit privileges (escalat...
    Rule Medium Severity
  • SRG-APP-000380

    Group
  • The application must enforce access restrictions associated with changes to application configuration.

    Failure to provide logical access restrictions associated with changes to application configuration may have significant effects on the overall security of the system. When dealing with access re...
    Rule Medium Severity
  • SRG-APP-000383

    Group
  • Firewall rules must be configured on the Tanium Server for Console-to-Server communications.

    An HTML5 based application, the Tanium Console runs from any device with a browser that supports HTML5. For security, the HTTP and SOAP communication to the Tanium Server is SSL encrypted, so the T...
    Rule Medium Severity
  • SRG-APP-000383

    Group
  • Firewall rules must be configured on the Tanium Server for Server-to-Database communications.

    The Tanium Server can use either a SQL Server RDBMS installed locally to the same device as the Tanium Server application or a remote dedicated or shared SQL Server instance. Using a local SQL Serv...
    Rule Medium Severity
  • SRG-APP-000383

    Group
  • Firewall rules must be configured on the Tanium module server to allow Server-to-Module Server communications from the Tanium Server.

    The Tanium Module Server is used to extend the functionality of Tanium through the use of various workbenches. The Tanium Module Server requires communication with the Tanium Server on port 17477. ...
    Rule Medium Severity
  • SRG-APP-000383

    Group
  • Firewall rules must be configured on the Tanium Server for Server-to-Module Server communications.

    The Tanium Module Server is used to extend the functionality of Tanium through the use of various workbenches. The Tanium Module Server requires communication with the Tanium Server on port 17477. ...
    Rule Medium Severity
  • SRG-APP-000383

    Group
  • Firewall rules must be configured on the Tanium Server for Server-to-Zone Server communications.

    If using the Tanium Zone Server to proxy traffic from Tanium-managed computers on less trusted network segments to the Tanium Server on the core network, then the Tanium Zone Server Hub, typically ...
    Rule Medium Severity
  • SRG-APP-000416

    Group
  • The SSLHonorCipherOrder must be configured to disable weak encryption algorithms on the Tanium Server.

    Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to protect data. The application must implement cryptographic modules adhering to the higher standards ...
    Rule Medium Severity
  • SRG-APP-000416

    Group
  • The SSLCipherSuite must be configured to disable weak encryption algorithms on the Tanium Server.

    Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to protect data. The application must implement cryptographic modules adhering to the higher standards ...
    Rule Medium Severity
  • SRG-APP-000427

    Group
  • The Tanium Server certificate must be signed by a DOD Certificate Authority.

    The Tanium Server has the option to use a "self-signed" certificate or a Trusted Certificate Authority signed certificate for SSL connections. During evaluations of Tanium in Lab settings, customer...
    Rule Medium Severity
  • SRG-APP-000435

    Group
  • The Tanium application must limit the bandwidth used in communicating with endpoints to prevent a denial of service (DoS) condition at the server.

    DoS is a condition when a resource is not available for legitimate users. When this occurs, the organization either cannot accomplish its mission or must operate at degraded capacity. This require...
    Rule Medium Severity
  • SRG-APP-000456

    Group
  • The Tanium application must install security-relevant software updates within the time period directed by an authoritative source (e.g., IAVM, CTOs, DTMs, and STIGs).

    Security flaws with software applications are discovered daily. Vendors are constantly updating and patching their products to address newly discovered security vulnerabilities. Organizations (incl...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules