Skip to content

I - Mission Critical Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000015

    <GroupDescription></GroupDescription>
    Group
  • Tanium public keys of content providers must be validated against documented trusted content providers.

    &lt;VulnDiscussion&gt;A Tanium Sensor, also called content, enables an organization to gather real-time inventory, configuration, and compliance da...
    Rule Medium Severity
  • SRG-APP-000033

    <GroupDescription></GroupDescription>
    Group
  • The Tanium Action Approval feature must be enabled for two-person integrity when deploying actions to endpoints.

    &lt;VulnDiscussion&gt;The Tanium Action Approval feature provides a "four eyes" control mechanism designed to achieve a high-level of security and ...
    Rule Medium Severity
  • SRG-APP-000039

    <GroupDescription></GroupDescription>
    Group
  • The Tanium documentation identifying recognized and trusted Intel streams must be maintained.

    &lt;VulnDiscussion&gt;An IOC stream is a series or stream of IOCs that are imported from a vendor based on a subscription service. An IOC stream ca...
    Rule Medium Severity
  • SRG-APP-000039

    <GroupDescription></GroupDescription>
    Group
  • The Tanium Detect must be configured to receive IOC streams only from trusted sources.

    &lt;VulnDiscussion&gt;An IOC stream is a series or stream of intel that are imported from a vendor based on a subscription service or manually down...
    Rule Medium Severity
  • SRG-APP-000115

    <GroupDescription></GroupDescription>
    Group
  • The Tanium Connect module must be configured to forward Tanium Detect events to identified destinations.

    &lt;VulnDiscussion&gt;Indicators of Compromise (IOC) are artifacts, which are observed on the network or system that indicates computer intrusion. ...
    Rule Medium Severity
  • SRG-APP-000131

    <GroupDescription></GroupDescription>
    Group
  • The Tanium cryptographic signing capabilities must be enabled on the Tanium Server.

    &lt;VulnDiscussion&gt;All of Tanium's signing capabilities should be enabled upon install. Tanium supports the cryptographic signing and verificati...
    Rule Medium Severity
  • SRG-APP-000131

    <GroupDescription></GroupDescription>
    Group
  • The Tanium Server must be configured to only allow signed content to be imported.

    &lt;VulnDiscussion&gt;Changes to any software components can have significant effects on the overall security of the application. Verifying softwar...
    Rule Medium Severity
  • SRG-APP-000133

    <GroupDescription></GroupDescription>
    Group
  • All installation files originally downloaded to the Tanium Server must be configured to download to a location other than the Tanium Server directory.

    &lt;VulnDiscussion&gt;Typically, the Tanium Server stores the Package Source Files that it downloads from the Internet and server shares or files u...
    Rule Medium Severity
  • SRG-APP-000142

    <GroupDescription></GroupDescription>
    Group
  • Firewall rules must be configured on the Tanium Server for Client-to-Server communications.

    &lt;VulnDiscussion&gt;In addition to the client-to-server TCP communication that takes place over port 17472, Tanium Clients also communicate to ot...
    Rule Medium Severity
  • SRG-APP-000142

    <GroupDescription></GroupDescription>
    Group
  • Firewall rules must be configured on the Tanium Zone Server for Client-to-Zone Server communications.

    &lt;VulnDiscussion&gt;In customer environments using the Tanium Zone Server, a Tanium Client may be configured to point to a Zone Server instead of...
    Rule Medium Severity
  • SRG-APP-000142

    <GroupDescription></GroupDescription>
    Group
  • The Tanium Application Server must be configured to prohibit or restrict the use of organization-defined functions, ports, protocols, and/or services, as defined in the PPSM CAL and vulnerability assessments.

    &lt;VulnDiscussion&gt;In order to prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling (i.e....
    Rule Medium Severity
  • SRG-APP-000175

    <GroupDescription></GroupDescription>
    Group
  • The Tanium Server certificates must have Extended Key Usage entries for the serverAuth object TLS Web Server Authentication and the clientAuth object TLS Web Client Authentication.

    &lt;VulnDiscussion&gt;Information can be either unintentionally or maliciously disclosed or modified during reception including, for example, durin...
    Rule Medium Severity
  • SRG-APP-000176

    <GroupDescription></GroupDescription>
    Group
  • The Tanium Server certificate and private/public keys directory must be protected with appropriate permissions.

    &lt;VulnDiscussion&gt;If the private key is discovered, an attacker can use the key to authenticate as an authorized user and gain access to the ne...
    Rule High Severity
  • SRG-APP-000211

    <GroupDescription></GroupDescription>
    Group
  • The Tanium Module server must be installed on a separate system.

    &lt;VulnDiscussion&gt;Unauthorized access to the Tanium Server is protected by disabling the Module Server service on the Tanium Server and by conf...
    Rule Medium Severity
  • SRG-APP-000328

    <GroupDescription></GroupDescription>
    Group
  • The Tanium Server directory must be restricted with appropriate permissions.

    &lt;VulnDiscussion&gt;Discretionary Access Control (DAC) is based on the notion that individual users are "owners" of objects and therefore have di...
    Rule Medium Severity
  • SRG-APP-000328

    <GroupDescription></GroupDescription>
    Group
  • The Tanium Server http directory and sub-directories must be restricted with appropriate permissions.

    &lt;VulnDiscussion&gt;Discretionary Access Control (DAC) is based on the notion that individual users are "owners" of objects and therefore have di...
    Rule Medium Severity
  • SRG-APP-000328

    <GroupDescription></GroupDescription>
    Group
  • The permissions on the Tanium Server registry keys must be restricted to only the Tanium service account and the [Tanium Admins] group.

    &lt;VulnDiscussion&gt;Discretionary Access Control (DAC) is based on the notion that individual users are "owners" of objects and therefore have di...
    Rule Medium Severity
  • SRG-APP-000328

    <GroupDescription></GroupDescription>
    Group
  • The Tanium Server Logs and TDL_Logs directories must be restricted with appropriate permissions.

    &lt;VulnDiscussion&gt;Discretionary Access Control (DAC) is based on the notion that individual users are "owners" of objects and therefore have di...
    Rule Medium Severity
  • SRG-APP-000340

    <GroupDescription></GroupDescription>
    Group
  • All Active Directory accounts synchronized with Tanium for non-privileged functions must be non-privileged domain accounts.

    &lt;VulnDiscussion&gt;Tanium has the ability to synchronize with Active Directory for Tanium account management. Tanium advises that all replicated...
    Rule Medium Severity
  • SRG-APP-000358

    <GroupDescription></GroupDescription>
    Group
  • A Tanium connector must be configured to send log data to an external audit log reduction capable system.

    &lt;VulnDiscussion&gt;While the Tanium Server records audit log entries to the Tanium SQL database, retrieval and aggregation of log data through t...
    Rule Medium Severity
  • SRG-APP-000377

    <GroupDescription></GroupDescription>
    Group
  • File integrity monitoring of critical executables that Tanium uses must be configured.

    &lt;VulnDiscussion&gt;Tanium inherently watches files and their respective hash values for change but while Tanium can do file integrity checks of ...
    Rule Medium Severity
  • SRG-APP-000383

    <GroupDescription></GroupDescription>
    Group
  • Firewall rules must be configured on the Tanium module server to allow Server-to-Module Server communications from the Tanium Server.

    &lt;VulnDiscussion&gt;The Tanium Module Server is used to extend the functionality of Tanium through the use of various workbenches. The Tanium Mod...
    Rule Medium Severity
  • SRG-APP-000383

    <GroupDescription></GroupDescription>
    Group
  • Firewall rules must be configured on the Tanium Server for Server-to-Module Server communications.

    &lt;VulnDiscussion&gt;The Tanium Module Server is used to extend the functionality of Tanium through the use of various workbenches. The Tanium Mod...
    Rule Medium Severity
  • SRG-APP-000383

    <GroupDescription></GroupDescription>
    Group
  • Firewall rules must be configured on the Tanium Server for Server-to-Zone Server communications.

    &lt;VulnDiscussion&gt;If you are using the Tanium Zone Server to proxy traffic from Tanium-managed computers on less trusted network segments to th...
    Rule Medium Severity
  • SRG-APP-000416

    <GroupDescription></GroupDescription>
    Group
  • The SSLHonorCipherOrder must be configured to disable weak encryption algorithms on the Tanium Server.

    &lt;VulnDiscussion&gt;Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to protect data. The applicatio...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules