Skip to content

I - Mission Critical Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000039

    <GroupDescription></GroupDescription>
    Group
  • The Tanium documentation identifying recognized and trusted OVAL feeds must be maintained.

    &lt;VulnDiscussion&gt;OVAL XML documents are provided from several possible sources such as the CIS open source repository, or any number of vendor...
    Rule Medium Severity
  • SRG-APP-000039

    <GroupDescription></GroupDescription>
    Group
  • Tanium Comply must be configured to receive SCAP feeds only from trusted sources.

    &lt;VulnDiscussion&gt;NIST-validated SCAP XML documents are provided from several possible sources such as DISA, NIST, and the other non-government...
    Rule Medium Severity
  • SRG-APP-000039

    <GroupDescription></GroupDescription>
    Group
  • Tanium Comply must be configured to receive OVAL feeds only from trusted sources.

    &lt;VulnDiscussion&gt;OVAL XML documents are provided from several possible sources such as the CIS open source repository, or any number of vendor...
    Rule Medium Severity
  • SRG-APP-000226

    <GroupDescription></GroupDescription>
    Group
  • Tanium must be configured in a High-Availability (HA) setup to ensure minimal loss of data and minimal disruption to mission processes in the event of a system failure.

    &lt;VulnDiscussion&gt;Failure to a known state can address safety or security in accordance with the mission/business needs of the organization. Fa...
    Rule Medium Severity
  • SRG-APP-000247

    <GroupDescription></GroupDescription>
    Group
  • The bandwidth consumption for the Tanium Server must be limited.

    &lt;VulnDiscussion&gt;DoS is a condition when a resource is not available for legitimate users. When this occurs, the organization either cannot ac...
    Rule Medium Severity
  • SRG-APP-000357

    <GroupDescription></GroupDescription>
    Group
  • The Tanium SQL Server RDBMS must be configured with sufficient free space to ensure audit logging is not impacted.

    &lt;VulnDiscussion&gt;In order to ensure Tanium has sufficient storage capacity in which to write the audit logs, the SQL Server RDMBS must be conf...
    Rule Medium Severity
  • SRG-APP-000435

    <GroupDescription></GroupDescription>
    Group
  • Tanium must limit the bandwidth used in communicating with endpoints to prevent a denial-of-service (DoS) condition at the server.

    &lt;VulnDiscussion&gt;DoS is a condition when a resource is not available for legitimate users. When this occurs, the organization either cannot ac...
    Rule Medium Severity
  • SRG-APP-000456

    <GroupDescription></GroupDescription>
    Group
  • Tanium Server must install security-relevant software updates within the time period directed by an authoritative source (e.g., IAVM, CTOs, DTMs, and STIGs).

    &lt;VulnDiscussion&gt;Security flaws with software applications are discovered daily. Vendors are constantly updating and patching their products t...
    Rule Medium Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • Tanium Server files must be excluded from host-based intrusion prevention intervention.

    &lt;VulnDiscussion&gt;Similar to any other host-based applications, the Tanium Server is subject to the restrictions other System-level software ma...
    Rule Medium Severity
  • SRG-APP-000295

    <GroupDescription></GroupDescription>
    Group
  • Tanium must set an absolute timeout for sessions.

    &lt;VulnDiscussion&gt;Automatic session termination addresses the termination of user-initiated logical sessions in contrast to the termination of ...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules