Skip to content

I - Mission Critical Classified

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000015

    <GroupDescription></GroupDescription>
    Group
  • The Tanium endpoint must have the Tanium Servers public key in its installation, which will allow it to authenticate and uniquely identify all network-connected endpoint devices before establishing any connection.

    &lt;VulnDiscussion&gt;Without cryptographic integrity protections, information can be altered by unauthorized users without detection. Without iden...
    Rule Medium Severity
  • SRG-APP-000119

    <GroupDescription></GroupDescription>
    Group
  • Access to Tanium logs on each endpoint must be restricted by permissions.

    &lt;VulnDiscussion&gt;For the Tanium Client software to run without impact from external negligent or malicious changes, the permissions on the Tan...
    Rule Medium Severity
  • SRG-APP-000131

    <GroupDescription></GroupDescription>
    Group
  • The Tanium cryptographic signing capabilities must be enabled on the Tanium Clients, which will ensure the authenticity of communications sessions when answering requests from the Tanium Server.

    &lt;VulnDiscussion&gt;All of Tanium's signing capabilities should be enabled upon install. Tanium supports the cryptographic signing and verificati...
    Rule Medium Severity
  • SRG-APP-000142

    <GroupDescription></GroupDescription>
    Group
  • Firewall rules must be configured on the Tanium Endpoints for Client-to-Server communications.

    &lt;VulnDiscussion&gt;In addition to the client-to-server TCP communication that takes place over port 17472, Tanium Clients also communicate to ot...
    Rule Medium Severity
  • SRG-APP-000328

    <GroupDescription></GroupDescription>
    Group
  • Control of the Tanium Client service must be restricted to SYSTEM access only for all managed clients.

    &lt;VulnDiscussion&gt;The reliability of the Tanium client's ability to operate depends upon controlling access to the Tanium client service. By re...
    Rule Medium Severity
  • SRG-APP-000328

    <GroupDescription></GroupDescription>
    Group
  • The ability to uninstall the Tanium Client service must be disabled on all managed clients.

    &lt;VulnDiscussion&gt;By default, end users have the ability to uninstall software on their clients. In the event the Tanium Client software is uni...
    Rule Medium Severity
  • SRG-APP-000328

    <GroupDescription></GroupDescription>
    Group
  • The permissions on the Tanium Client directory must be restricted to only the SYSTEM account on all managed clients.

    &lt;VulnDiscussion&gt;By restricting access to the Tanium Client directory on managed clients, the Tanium client's ability to operate and function ...
    Rule Medium Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • Tanium endpoint files must be excluded from on-access antivirus actions.

    &lt;VulnDiscussion&gt;Similar to any other host-based applications, the Tanium Client is subject to the restrictions other System-level software ma...
    Rule Medium Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • The Tanium Client Deployment Tool (CDT) must not be configured to use the psexec method of deployment.

    &lt;VulnDiscussion&gt;When using the Tanium Client Deployment Tool (CDT), using psexec represents an increased vulnerability as the NTLM hash and c...
    Rule Medium Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • Tanium endpoint files must be protected from file encryption actions.

    &lt;VulnDiscussion&gt;Similar to any other host-based applications, the Tanium Client is subject to the restrictions other System-level software ma...
    Rule Medium Severity
  • SRG-APP-000246

    <GroupDescription></GroupDescription>
    Group
  • Tanium must restrict the ability of individuals to place too much impact upon the network, which might result in a denial-of-service (DoS) event on the network by using RandomSensorDelayInSeconds.

    &lt;VulnDiscussion&gt;DoS is a condition where a resource is not available for legitimate users. When this occurs, the organization either cannot a...
    Rule Medium Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • Tanium endpoint files must be excluded from host-based intrusion prevention intervention.

    &lt;VulnDiscussion&gt;Similar to any other host-based applications, the Tanium Client is subject to the restrictions other System-level software ma...
    Rule Medium Severity
  • SRG-APP-000023

    <GroupDescription></GroupDescription>
    Group
  • The Tanium Server must be configured with a connector to sync to Microsoft Active Directory for account management functions, must isolate security functions from non-security functions, and must terminate shared/group account credentials when members leave the group.

    &lt;VulnDiscussion&gt;By restricting access to the Tanium Server to only Microsoft Active Directory, user accounts and related permissions can be s...
    Rule Medium Severity
  • SRG-APP-000023

    <GroupDescription></GroupDescription>
    Group
  • The Tanium Server must be configured to only use Microsoft Active Directory for account management functions.

    &lt;VulnDiscussion&gt;By restricting access to the Tanium Server to only Microsoft Active Directory, user accounts and related permissions can be s...
    Rule Medium Severity
  • SRG-APP-000033

    <GroupDescription></GroupDescription>
    Group
  • Tanium Computer Groups must be used to restrict console users from affecting changes to unauthorized computers.

    &lt;VulnDiscussion&gt;Computer Groups allow a site running Tanium to assign responsibility of specific Computer Groups to specific Tanium console u...
    Rule Medium Severity
  • SRG-APP-000033

    <GroupDescription></GroupDescription>
    Group
  • Documentation identifying Tanium console users and their respective User Roles must be maintained.

    &lt;VulnDiscussion&gt;System access should be reviewed periodically to verify that all Tanium users are assigned the appropriate role, with the lea...
    Rule Medium Severity
  • SRG-APP-000033

    <GroupDescription></GroupDescription>
    Group
  • Role-based system access must be configured to least privileged access to Tanium Server functions through the Tanium interface.

    &lt;VulnDiscussion&gt;User accessibility to various Tanium Server functions performed via the console can be restricted by User Roles. Those User R...
    Rule High Severity
  • SRG-APP-000033

    <GroupDescription></GroupDescription>
    Group
  • Tanium console users User Roles must be validated against the documentation for User Roles.

    &lt;VulnDiscussion&gt;System access should be reviewed periodically to verify that all Tanium users are assigned the appropriate role, with the lea...
    Rule Medium Severity
  • SRG-APP-000033

    <GroupDescription></GroupDescription>
    Group
  • Documentation identifying Tanium console users and their respective Computer Group rights must be maintained.

    &lt;VulnDiscussion&gt;System access should be reviewed periodically to verify that all Tanium users are assigned the appropriate role, with the lea...
    Rule Medium Severity
  • SRG-APP-000033

    <GroupDescription></GroupDescription>
    Group
  • Tanium console users Computer Group rights must be validated against the documentation for Computer Group rights.

    &lt;VulnDiscussion&gt;System access should be reviewed periodically to verify that all Tanium users are assigned the appropriate role, with the lea...
    Rule Medium Severity
  • SRG-APP-000149

    <GroupDescription></GroupDescription>
    Group
  • Common Access Card (CAC)-based authentication must be enforced and enabled on the Tanium Server for network and local access with privileged and non-privileged accounts.

    &lt;VulnDiscussion&gt;To assure accountability and prevent unauthenticated access, organizational users must be identified and authenticated to pre...
    Rule High Severity
  • SRG-APP-000383

    <GroupDescription></GroupDescription>
    Group
  • Firewall rules must be configured on the Tanium Server for Console-to-Server communications.

    &lt;VulnDiscussion&gt;An HTML5 based application, the Tanium Console runs from any device with a browser that supports HTML5. For security, the HTT...
    Rule Medium Severity
  • SRG-APP-000070

    <GroupDescription></GroupDescription>
    Group
  • The publicly accessible Tanium application must display the Standard Mandatory DoD Notice and Consent Banner before granting access to the application.

    &lt;VulnDiscussion&gt;Display of a standardized and approved use notification before granting access to the publicly accessible application ensures...
    Rule Medium Severity
  • SRG-APP-000108

    <GroupDescription></GroupDescription>
    Group
  • Tanium must alert the ISSO and SA (at a minimum) in the event of an audit processing failure.

    &lt;VulnDiscussion&gt;It is critical for the appropriate personnel to be aware if a system is at risk of failing to process audit logs as required....
    Rule Medium Severity
  • SRG-APP-000270

    <GroupDescription></GroupDescription>
    Group
  • Flaw remediation Tanium applications must employ automated mechanisms to determine the state of information system components with regard to flaw remediation using the following frequency: continuously, where HBSS is used; 30 days, for any additional internal network scans not covered by HBSS; and annually, for external scans by Computer Network Defense Service Provider (CNDSP).

    &lt;VulnDiscussion&gt;Without the use of automated mechanisms to scan for security flaws on a continuous and/or periodic basis, the system componen...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules