Skip to content

II - Mission Support Classified

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000149

    <GroupDescription></GroupDescription>
    Group
  • Common Access Card (CAC)-based authentication must be enabled on the Tanium Server for network access with privileged accounts.

    &lt;VulnDiscussion&gt;To assure accountability and prevent unauthenticated access, organizational users must be identified and authenticated to pre...
    Rule High Severity
  • SRG-APP-000383

    <GroupDescription></GroupDescription>
    Group
  • Firewall rules must be configured on the Tanium Server for Console-to-Server communications.

    &lt;VulnDiscussion&gt;An HTML5 based application, the Tanium Console runs from any device with a browser that supports HTML5. For security, the HTT...
    Rule Medium Severity
  • SRG-APP-000070

    <GroupDescription></GroupDescription>
    Group
  • The publicly accessible Tanium application must display the Standard Mandatory DoD Notice and Consent Banner before granting access to the application.

    &lt;VulnDiscussion&gt;Display of a standardized and approved use notification before granting access to the publicly accessible application ensures...
    Rule Medium Severity
  • SRG-APP-000108

    <GroupDescription></GroupDescription>
    Group
  • Tanium must alert the ISSO and SA (at a minimum) in the event of an audit processing failure.

    &lt;VulnDiscussion&gt;It is critical for the appropriate personnel to be aware if a system is at risk of failing to process audit logs as required....
    Rule Medium Severity
  • SRG-APP-000270

    <GroupDescription></GroupDescription>
    Group
  • Flaw remediation Tanium applications must employ automated mechanisms to determine the state of information system components with regard to flaw remediation using the following frequency: continuously, where HBSS is used; 30 days, for any additional internal network scans not covered by HBSS; and annually, for external scans by Computer Network Defense Service Provider (CNDSP).

    &lt;VulnDiscussion&gt;Without the use of automated mechanisms to scan for security flaws on a continuous and/or periodic basis, the system componen...
    Rule Medium Severity
  • SRG-APP-000291

    <GroupDescription></GroupDescription>
    Group
  • Tanium must notify SA and ISSO when accounts are created.

    &lt;VulnDiscussion&gt;Once an attacker establishes initial access to a system, the attacker often attempts to create a persistent method of re-esta...
    Rule Medium Severity
  • SRG-APP-000292

    <GroupDescription></GroupDescription>
    Group
  • Tanium must notify SA and ISSO when accounts are modified.

    &lt;VulnDiscussion&gt;Once an attacker establishes initial access to a system, the attacker often attempts to create a persistent method of re-esta...
    Rule Medium Severity
  • SRG-APP-000320

    <GroupDescription></GroupDescription>
    Group
  • The Tanium application must notify SA and ISSO of account enabling actions.

    &lt;VulnDiscussion&gt;Once an attacker establishes initial access to a system, the attacker often attempts to create a persistent method of re-esta...
    Rule Medium Severity
  • SRG-APP-000359

    <GroupDescription></GroupDescription>
    Group
  • The Tanium application must provide an immediate warning to the SA and ISSO (at a minimum) when allocated audit record storage volume reaches 75% of repository maximum audit record storage capacity.

    &lt;VulnDiscussion&gt;If security personnel are not notified immediately upon storage volume utilization reaching 75%, they are unable to plan for ...
    Rule Medium Severity
  • SRG-APP-000360

    <GroupDescription></GroupDescription>
    Group
  • The Tanium enterprise audit log reduction option must be configured to provide alerts based off Tanium audit data.

    &lt;VulnDiscussion&gt;It is critical for the appropriate personnel to be aware if a system is at risk of failing to process audit logs as required....
    Rule Medium Severity
  • SRG-APP-000148

    <GroupDescription></GroupDescription>
    Group
  • Common Access Card (CAC)-based authentication must be enabled and enforced on the Tanium Server for all access and all accounts.

    &lt;VulnDiscussion&gt;To assure accountability and prevent unauthenticated access, organizational users must be identified and authenticated to pre...
    Rule Medium Severity
  • SRG-APP-000293

    <GroupDescription></GroupDescription>
    Group
  • Tanium must notify SA and ISSO for account disabling actions.

    &lt;VulnDiscussion&gt;When application accounts are disabled, user accessibility is affected. Accounts are utilized for identifying individual appl...
    Rule Medium Severity
  • SRG-APP-000294

    <GroupDescription></GroupDescription>
    Group
  • Tanium must notify SA and ISSO for account removal actions.

    &lt;VulnDiscussion&gt;When application accounts are removed, user accessibility is affected. Accounts are utilized for identifying individual appli...
    Rule Medium Severity
  • SRG-APP-000378

    <GroupDescription></GroupDescription>
    Group
  • The Tanium application must prohibit user installation of software without explicit privileged status.

    &lt;VulnDiscussion&gt;Allowing regular users to install software, without explicit privileges, creates the risk that untested or potentially malici...
    Rule Medium Severity
  • SRG-APP-000033

    <GroupDescription></GroupDescription>
    Group
  • Documentation defining Tanium functional roles must be maintained.

    &lt;VulnDiscussion&gt;System access should be reviewed periodically to verify that all Tanium users are assigned the appropriate role, with the lea...
    Rule Medium Severity
  • SRG-APP-000323

    <GroupDescription></GroupDescription>
    Group
  • The Tanium database(s) must be installed on a separate system.

    &lt;VulnDiscussion&gt;Failure to protect organizational information from data mining may result in a compromise of information. Data storage objec...
    Rule Medium Severity
  • SRG-APP-000323

    <GroupDescription></GroupDescription>
    Group
  • The Tanium application database must be dedicated to only the Tanium application.

    &lt;VulnDiscussion&gt;Failure to protect organizational information from data mining may result in a compromise of information. Data storage objec...
    Rule Medium Severity
  • SRG-APP-000381

    <GroupDescription></GroupDescription>
    Group
  • The access to the Tanium SQL database must be restricted. Only the designated database administrator(s) can have elevated privileges to the Tanium SQL database.

    &lt;VulnDiscussion&gt;After the Tanium Server has been installed and the Tanium databases created, only the Tanium Receiver, Tanium Module, and Tan...
    Rule Medium Severity
  • SRG-APP-000381

    <GroupDescription></GroupDescription>
    Group
  • The Tanium Server installers account database permissions must be reduced to an appropriate level.

    &lt;VulnDiscussion&gt;Creating the tanium and tanium_archive databases through the Tanium Server installer program or using the database create SQL...
    Rule Medium Severity
  • SRG-APP-000383

    <GroupDescription></GroupDescription>
    Group
  • Firewall rules must be configured on the Tanium Server for Server-to-Database communications.

    &lt;VulnDiscussion&gt;The Tanium Server can use either a SQL Server RDBMS installed locally to the same device as the Tanium Server application or ...
    Rule Medium Severity
  • SRG-APP-000454

    <GroupDescription></GroupDescription>
    Group
  • SQL stored queries or procedures installed during Tanium installation must be removed from the Tanium Server.

    &lt;VulnDiscussion&gt;Failure to protect organizational information from data mining may result in a compromise of information. Data storage objec...
    Rule Medium Severity
  • SRG-APP-000429

    <GroupDescription></GroupDescription>
    Group
  • The Tanium Server must protect the confidentiality and integrity of transmitted information, in preparation to be transmitted and data at rest, with cryptographic signing capabilities enabled to protect the authenticity of communications sessions when making requests from Tanium Clients.

    &lt;VulnDiscussion&gt;Without protection of the transmitted information, confidentiality and integrity may be compromised since unprotected communi...
    Rule Medium Severity
  • SRG-APP-000003

    <GroupDescription></GroupDescription>
    Group
  • The Tanium Application Server console must be configured to initiate a session lock after a 15-minute period of inactivity.

    &lt;VulnDiscussion&gt;The Tanium Console, when CAC is enabled, will initiate a session lock based upon the ActivClient or other Smart Card software...
    Rule Medium Severity
  • SRG-APP-000015

    <GroupDescription></GroupDescription>
    Group
  • Tanium Trusted Content providers must be documented.

    &lt;VulnDiscussion&gt;A Tanium Sensor, also called content, enables an organization to gather real-time inventory, configuration, and compliance da...
    Rule Medium Severity
  • SRG-APP-000015

    <GroupDescription></GroupDescription>
    Group
  • Content providers must provide their public key to the Tanium administrator to import for validating signed content.

    &lt;VulnDiscussion&gt;A Tanium Sensor, also called content, enables an organization to gather real-time inventory, configuration, and compliance da...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules