I - Mission Critical Classified
Rules and Groups employed by this XCCDF Profile
-
SRG-APP-000291
<GroupDescription></GroupDescription>Group -
Tanium must notify system administrators and ISSO when accounts are created.
<VulnDiscussion>Once an attacker establishes initial access to a system, the attacker often attempts to create a persistent method of re-esta...Rule Medium Severity -
SRG-APP-000292
<GroupDescription></GroupDescription>Group -
Tanium must notify system administrators and ISSO when accounts are modified.
<VulnDiscussion>Once an attacker establishes initial access to a system, the attacker often attempts to create a persistent method of re-esta...Rule Medium Severity -
SRG-APP-000320
<GroupDescription></GroupDescription>Group -
Tanium must notify the SA and ISSO of account enabling actions.
<VulnDiscussion>Once an attacker establishes initial access to a system, the attacker often attempts to create a persistent method of re-esta...Rule Medium Severity -
SRG-APP-000359
<GroupDescription></GroupDescription>Group -
Tanium must provide an immediate warning to the SA and ISSO (at a minimum) when allocated audit record storage volume reaches 75 percent of repository maximum audit record storage capacity.
<VulnDiscussion>If security personnel are not notified immediately upon storage volume utilization reaching 75 percent, they are unable to pl...Rule Medium Severity -
SRG-APP-000148
<GroupDescription></GroupDescription>Group -
Common Access Card (CAC)-based authentication must be enabled and enforced on the Tanium Server for all access and all accounts.
<VulnDiscussion>To assure accountability and prevent unauthenticated access, organizational users must be identified and authenticated to pre...Rule Medium Severity -
SRG-APP-000293
<GroupDescription></GroupDescription>Group -
Tanium must notify System Administrators and Information System Security Officers for account disabling actions.
<VulnDiscussion>When application accounts are disabled, user accessibility is affected. Accounts are used for identifying individual applicat...Rule Medium Severity -
SRG-APP-000294
<GroupDescription></GroupDescription>Group -
Tanium must notify System Administrators and Information System Security Officers for account removal actions.
<VulnDiscussion>When application accounts are removed, user accessibility is affected. Accounts are used for identifying individual applicati...Rule Medium Severity -
SRG-APP-000378
<GroupDescription></GroupDescription>Group -
Tanium must prohibit user installation of software without explicit privileged status and enforce access restrictions associated with changes to application configuration.
<VulnDiscussion>Allowing regular users to install software without explicit privileges creates the risk that untested or potentially maliciou...Rule Medium Severity -
SRG-APP-000111
<GroupDescription></GroupDescription>Group -
Tanium must provide the capability to centrally review and analyze audit records from multiple components within the system.
<VulnDiscussion>Successful incident response and auditing relies on timely, accurate system information and analysis in order to allow the or...Rule Medium Severity -
SRG-APP-000323
<GroupDescription></GroupDescription>Group -
The Tanium SQL database must be installed on a separate system.
<VulnDiscussion>Failure to protect organizational information from data mining may result in a compromise of information. Data storage objec...Rule Medium Severity -
SRG-APP-000323
<GroupDescription></GroupDescription>Group -
The Tanium SQL server must be dedicated to the Tanium database.
<VulnDiscussion>Failure to protect organizational information from data mining may result in a compromise of information. Data storage objec...Rule Medium Severity -
SRG-APP-000381
<GroupDescription></GroupDescription>Group -
The access to the Tanium SQL database must be restricted. Only the designated database administrator(s) can have elevated privileges to the Tanium SQL database.
<VulnDiscussion>After the Tanium Server has been installed and the Tanium databases created, only the Tanium Receiver, Tanium Module, and Tan...Rule Medium Severity -
SRG-APP-000381
<GroupDescription></GroupDescription>Group -
The Tanium Server installers account SQL database permissions must be reduced from sysadmin to db_owner.
<VulnDiscussion>Creating the tanium and tanium_archive databases through the Tanium Server installer program or using the database create SQL...Rule Medium Severity -
SRG-APP-000383
<GroupDescription></GroupDescription>Group -
Firewall rules must be configured on the Tanium Server for Server-to-Database communications.
<VulnDiscussion>The Tanium Server can use either a SQL Server RDBMS installed locally to the same device as the Tanium Server application or ...Rule Medium Severity -
SRG-APP-000454
<GroupDescription></GroupDescription>Group -
SQL stored queries or procedures installed during Tanium installation must be removed from the Tanium Server.
<VulnDiscussion>Failure to protect organizational information from data mining may result in a compromise of information. Data storage objec...Rule Medium Severity -
SRG-APP-000439
<GroupDescription></GroupDescription>Group -
The Tanium Server must protect the confidentiality and integrity of transmitted information with cryptographic signing capabilities enabled to ensure the authenticity of communications sessions when making requests from Tanium Clients.
<VulnDiscussion>Without protection of the transmitted information, confidentiality and integrity may be compromised since unprotected communi...Rule Medium Severity -
SRG-APP-000003
<GroupDescription></GroupDescription>Group -
The Tanium Server console must be configured to initiate a session lock after a 15-minute period of inactivity.
<VulnDiscussion>The Tanium Console, when CAC is enabled, will initiate a session lock based upon the ActivClient or other Smart Card software...Rule Medium Severity -
SRG-APP-000015
<GroupDescription></GroupDescription>Group -
Tanium Trusted Content providers must be documented.
<VulnDiscussion>A Tanium Sensor, also called content, enables an organization to gather real-time inventory, configuration, and compliance da...Rule Medium Severity -
SRG-APP-000015
<GroupDescription></GroupDescription>Group -
Content providers must provide their public key to the Tanium administrator to import for validating signed content.
<VulnDiscussion>A Tanium Sensor, also called content, enables an organization to gather real-time inventory, configuration, and compliance da...Rule Medium Severity -
SRG-APP-000015
<GroupDescription></GroupDescription>Group -
Tanium public keys of content providers must be validated against documented trusted content providers.
<VulnDiscussion>A Tanium Sensor, also called content, enables an organization to gather real-time inventory, configuration, and compliance da...Rule Medium Severity -
SRG-APP-000033
<GroupDescription></GroupDescription>Group -
The Tanium Action Approval feature must be enabled for two person integrity when deploying actions to endpoints.
<VulnDiscussion>The Tanium Action Approval feature provides a "four eyes" control mechanism designed to achieve a high level of security and ...Rule Medium Severity -
SRG-APP-000039
<GroupDescription></GroupDescription>Group -
The Tanium documentation identifying recognized and trusted IOC Detect streams must be maintained.
<VulnDiscussion>An IOC stream is a series or "stream" of IOCs that are imported from a vendor based on a subscription service. An IOC stream ...Rule Medium Severity -
SRG-APP-000039
<GroupDescription></GroupDescription>Group -
The Tanium IOC Detect must be configured to receive IOC streams only from trusted sources.
<VulnDiscussion>An IOC stream is a series or "stream" of IOCs that are imported from a vendor based on a subscription service or manually dow...Rule Medium Severity -
SRG-APP-000115
<GroupDescription></GroupDescription>Group -
The Tanium Connect module must be configured to forward Tanium IOC Detect events to identified destinations.
<VulnDiscussion>Indicators of Compromise (IOC) is an artifact that is observed on the network or system that indicates computer intrusion. Th...Rule Medium Severity -
SRG-APP-000121
<GroupDescription></GroupDescription>Group -
The Tanium Server must protect audit tools from unauthorized access, modification, or deletion.
<VulnDiscussion>Protecting audit data also includes identifying and protecting the tools used to view and manipulate log data. Therefore, pro...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.