III - Administrative Sensitive
Rules and Groups employed by this XCCDF Profile
-
SRG-APP-000001
<GroupDescription></GroupDescription>Group -
The Tanium max_soap_sessions_total setting must be explicitly enabled to limit the number of simultaneous sessions.
<VulnDiscussion>Application management includes the ability to control the number of users and user sessions that utilize an application. Lim...Rule Medium Severity -
SRG-APP-000001
<GroupDescription></GroupDescription>Group -
The Tanium max_soap_sessions_per_user setting must be explicitly enabled to limit the number of simultaneous sessions.
<VulnDiscussion>Application management includes the ability to control the number of users and user sessions that utilize an application. Lim...Rule Medium Severity -
SRG-APP-000039
<GroupDescription></GroupDescription>Group -
The Tanium documentation identifying recognized and trusted folders for IOC Detect Folder streams must be maintained.
<VulnDiscussion>An IOC stream is a series or "stream" of IOCs that are imported from a vendor based on a subscription service or manually dow...Rule Medium Severity -
SRG-APP-000039
<GroupDescription></GroupDescription>Group -
The Tanium IOC Detect Folder streams must be configured to restrict access to only authorized maintainers of IOCs.
<VulnDiscussion>An IOC stream is a series or "stream" of IOCs that are imported from a vendor based on a subscription service or manually dow...Rule Medium Severity -
SRG-APP-000039
<GroupDescription></GroupDescription>Group -
The Tanium documentation identifying recognized and trusted SCAP feeds must be maintained.
<VulnDiscussion>NIST validated SCAP XML documents are provided from several possible sources such as DISA, NIST, and the other non-government...Rule Medium Severity -
SRG-APP-000039
<GroupDescription></GroupDescription>Group -
The Tanium documentation identifying recognized and trusted OVAL feeds must be maintained.
<VulnDiscussion>OVAL XML documents are provided from several possible sources such as the CIS open source repository, or any number of vendor...Rule Medium Severity -
SRG-APP-000039
<GroupDescription></GroupDescription>Group -
Tanium Comply must be configured to receive SCAP feeds only from trusted sources.
<VulnDiscussion>NIST-validated SCAP XML documents are provided from several possible sources such as DISA, NIST, and the other non-government...Rule Medium Severity -
SRG-APP-000039
<GroupDescription></GroupDescription>Group -
Tanium Comply must be configured to receive OVAL feeds only from trusted sources.
<VulnDiscussion>OVAL XML documents are provided from several possible sources such as the CIS open source repository, or any number of vendor...Rule Medium Severity -
SRG-APP-000226
<GroupDescription></GroupDescription>Group -
Tanium must be configured in a High-Availability (HA) setup to ensure minimal loss of data and minimal disruption to mission processes in the event of a system failure.
<VulnDiscussion>Failure to a known state can address safety or security in accordance with the mission/business needs of the organization. Fa...Rule Medium Severity -
SRG-APP-000247
<GroupDescription></GroupDescription>Group -
The bandwidth consumption for the Tanium Server must be limited.
<VulnDiscussion>DoS is a condition when a resource is not available for legitimate users. When this occurs, the organization either cannot ac...Rule Medium Severity -
SRG-APP-000357
<GroupDescription></GroupDescription>Group -
The Tanium SQL Server RDBMS must be configured with sufficient free space to ensure audit logging is not impacted.
<VulnDiscussion>In order to ensure Tanium has sufficient storage capacity in which to write the audit logs, the SQL Server RDMBS must be conf...Rule Medium Severity -
SRG-APP-000435
<GroupDescription></GroupDescription>Group -
Tanium must limit the bandwidth used in communicating with endpoints to prevent a denial-of-service (DoS) condition at the server.
<VulnDiscussion>DoS is a condition when a resource is not available for legitimate users. When this occurs, the organization either cannot ac...Rule Medium Severity -
SRG-APP-000456
<GroupDescription></GroupDescription>Group -
Tanium Server must install security-relevant software updates within the time period directed by an authoritative source (e.g., IAVM, CTOs, DTMs, and STIGs).
<VulnDiscussion>Security flaws with software applications are discovered daily. Vendors are constantly updating and patching their products t...Rule Medium Severity -
SRG-APP-000516
<GroupDescription></GroupDescription>Group -
Tanium Server files must be excluded from host-based intrusion prevention intervention.
<VulnDiscussion>Similar to any other host-based applications, the Tanium Server is subject to the restrictions other System-level software ma...Rule Medium Severity -
SRG-APP-000295
<GroupDescription></GroupDescription>Group -
Tanium must set an absolute timeout for sessions.
<VulnDiscussion>Automatic session termination addresses the termination of user-initiated logical sessions in contrast to the termination of ...Rule Medium Severity -
SRG-APP-000295
<GroupDescription></GroupDescription>Group -
Tanium must set an inactive timeout for sessions.
<VulnDiscussion>Leaving sessions open indefinitely is a major security risk. An attacker can easily use an already authenticated session to a...Rule Medium Severity -
SRG-APP-000435
<GroupDescription></GroupDescription>Group -
Tanium service must be protected from being stopped by a non-privileged user.
<VulnDiscussion>DoS is a condition when a resource is not available for legitimate users. When this occurs, the organization either cannot ac...Rule Medium Severity -
SRG-APP-000435
<GroupDescription></GroupDescription>Group -
The Tanium web server must be tuned to handle the operational requirements of the hosted application.
<VulnDiscussion>Denial of service (DoS) is a condition when a resource is not available for legitimate users. When this occurs, the organizat...Rule Medium Severity -
SRG-APP-000439
<GroupDescription></GroupDescription>Group -
Tanium must be configured to communicate using TLS 1.2 Strict Only.
<VulnDiscussion>Without protection of the transmitted information, confidentiality and integrity may be compromised since unprotected communi...Rule Medium Severity -
SRG-APP-000439
<GroupDescription></GroupDescription>Group -
Tanium must be configured to communicate using TLS 1.2 Strict Only.
<VulnDiscussion>Without protection of the transmitted information, confidentiality and integrity may be compromised since unprotected communi...Rule Medium Severity -
SRG-APP-000439
<GroupDescription></GroupDescription>Group -
Tanium must be configured to communicate using TLS 1.2 Strict Only.
<VulnDiscussion>Without protection of the transmitted information, confidentiality and integrity may be compromised since unprotected communi...Rule Medium Severity -
SRG-APP-000439
<GroupDescription></GroupDescription>Group -
Tanium must be configured to communicate using TLS 1.2 Strict Only.
<VulnDiscussion>Without protection of the transmitted information, confidentiality and integrity may be compromised since unprotected communi...Rule Medium Severity -
SRG-APP-000439
<GroupDescription></GroupDescription>Group -
Tanium must be configured to communicate using TLS 1.2 Strict Only.
<VulnDiscussion>Without protection of the transmitted information, confidentiality and integrity may be compromised since unprotected communi...Rule Medium Severity -
SRG-APP-000439
<GroupDescription></GroupDescription>Group -
Tanium must be configured to communicate using TLS 1.2 Strict Only.
<VulnDiscussion>Without protection of the transmitted information, confidentiality and integrity may be compromised since unprotected communi...Rule Medium Severity -
SRG-APP-000439
<GroupDescription></GroupDescription>Group -
Tanium must be configured to communicate using TLS 1.2 Strict Only.
<VulnDiscussion>Without protection of the transmitted information, confidentiality and integrity may be compromised since unprotected communi...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.