Skip to content

III - Administrative Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000033

    <GroupDescription></GroupDescription>
    Group
  • Documentation identifying Tanium console users, their respective functional roles, and computer groups must be maintained.

    &lt;VulnDiscussion&gt;System access should be reviewed periodically to verify that all Tanium users are assigned the appropriate functional role, w...
    Rule Medium Severity
  • SRG-APP-000033

    <GroupDescription></GroupDescription>
    Group
  • Role-based system access must be configured to least privileged access to Tanium Server functions through the Tanium interface.

    &lt;VulnDiscussion&gt;User accessibility to various Tanium Server functions performed via the console can be restricted by functional roles, a comb...
    Rule High Severity
  • SRG-APP-000033

    <GroupDescription></GroupDescription>
    Group
  • Tanium console users User Roles must be validated against the documentation for User Roles.

    &lt;VulnDiscussion&gt;System access should be reviewed periodically to verify that all Tanium users are assigned the appropriate role, with the lea...
    Rule Medium Severity
  • SRG-APP-000033

    <GroupDescription></GroupDescription>
    Group
  • Documentation identifying Tanium console users and their respective Computer Group rights must be maintained.

    &lt;VulnDiscussion&gt;System access should be reviewed periodically to verify that all Tanium users are assigned the appropriate role, with the lea...
    Rule Medium Severity
  • SRG-APP-000033

    <GroupDescription></GroupDescription>
    Group
  • Tanium console users Computer Group rights must be validated against the documentation for Computer Group rights.

    &lt;VulnDiscussion&gt;System access should be reviewed periodically to verify that all Tanium users are assigned the appropriate role, with the lea...
    Rule Medium Severity
  • SRG-APP-000149

    <GroupDescription></GroupDescription>
    Group
  • Common Access Card (CAC)-based authentication must be enabled on the Tanium Server for network access with privileged accounts.

    &lt;VulnDiscussion&gt;To assure accountability and prevent unauthenticated access, organizational users must be identified and authenticated to pre...
    Rule High Severity
  • SRG-APP-000383

    <GroupDescription></GroupDescription>
    Group
  • Firewall rules must be configured on the Tanium Server for Console-to-Server communications.

    &lt;VulnDiscussion&gt;An HTML5 based application, the Tanium Console runs from any device with a browser that supports HTML5. For security, the HTT...
    Rule Medium Severity
  • SRG-APP-000070

    <GroupDescription></GroupDescription>
    Group
  • The publicly accessible Tanium application must display the Standard Mandatory DoD Notice and Consent Banner before granting access to the application.

    &lt;VulnDiscussion&gt;Display of a standardized and approved use notification before granting access to the publicly accessible application ensures...
    Rule Medium Severity
  • SRG-APP-000108

    <GroupDescription></GroupDescription>
    Group
  • Tanium must alert the ISSO and SA (at a minimum) in the event of an audit processing failure.

    &lt;VulnDiscussion&gt;It is critical for the appropriate personnel to be aware if a system is at risk of failing to process audit logs as required....
    Rule Medium Severity
  • SRG-APP-000270

    <GroupDescription></GroupDescription>
    Group
  • Flaw remediation Tanium applications must employ automated mechanisms to determine the state of information system components with regard to flaw remediation using the following frequency: continuously, where HBSS is used; 30 days, for any additional internal network scans not covered by HBSS; and annually, for external scans by Computer Network Defense Service Provider (CNDSP).

    &lt;VulnDiscussion&gt;Without the use of automated mechanisms to scan for security flaws on a continuous and/or periodic basis, the system componen...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules