Skip to content

I - Mission Critical Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000115

    <GroupDescription></GroupDescription>
    Group
  • The Tanium applications must provide the capability to filter audit records for events of interest based upon organization-defined criteria.

    &lt;VulnDiscussion&gt;The ability to specify the event criteria of interest provides the persons reviewing the logs with the ability to quickly iso...
    Rule Medium Severity
  • SRG-APP-000119

    <GroupDescription></GroupDescription>
    Group
  • Access to Tanium logs on each endpoint must be restricted by permissions.

    &lt;VulnDiscussion&gt;For the Tanium Client software to run without impact from external negligent or malicious changes, the permissions on the Tan...
    Rule Medium Severity
  • SRG-APP-000121

    <GroupDescription></GroupDescription>
    Group
  • The Tanium application must prohibit user installation, modification, or deletion of software without explicit privileged status.

    &lt;VulnDiscussion&gt;Allowing regular users to install, modify, or delete software, without explicit privileges, creates the risk that the applica...
    Rule Medium Severity
  • SRG-APP-000131

    <GroupDescription></GroupDescription>
    Group
  • The Tanium cryptographic signing capabilities must be enabled on the Tanium Clients to safeguard the authenticity of communications sessions when answering requests from the Tanium Server.

    &lt;VulnDiscussion&gt;All of Tanium's signing capabilities should be enabled upon install. Tanium supports the cryptographic signing and verificati...
    Rule Medium Severity
  • SRG-APP-000131

    <GroupDescription></GroupDescription>
    Group
  • The Tanium cryptographic signing capabilities must be enabled on the Tanium Server.

    &lt;VulnDiscussion&gt;All of Tanium's signing capabilities must be enabled upon install. Tanium supports the cryptographic signing and verification...
    Rule Medium Severity
  • SRG-APP-000142

    <GroupDescription></GroupDescription>
    Group
  • Firewall rules must be configured on the Tanium Endpoints for Client-to-Server communications.

    &lt;VulnDiscussion&gt;In addition to the client-to-server TCP communication that takes place over port 17472, Tanium Clients also communicate to ot...
    Rule Medium Severity
  • SRG-APP-000142

    <GroupDescription></GroupDescription>
    Group
  • Firewall rules must be configured on the Tanium Server for Client-to-Server communications.

    &lt;VulnDiscussion&gt;In addition to the client-to-server TCP communication that takes place over port 17472, Tanium Clients also communicate to ot...
    Rule Medium Severity
  • SRG-APP-000142

    <GroupDescription></GroupDescription>
    Group
  • Firewall rules must be configured on the Tanium Zone Server for Client-to-Zone Server communications.

    &lt;VulnDiscussion&gt;In customer environments using the Tanium Zone Server, a Tanium Client may be configured to point to a Zone Server instead of...
    Rule Medium Severity
  • SRG-APP-000142

    <GroupDescription></GroupDescription>
    Group
  • The Tanium Application Server must be configured to prohibit or restrict the use of organization-defined functions, ports, protocols, and/or services, as defined in the PPSM CAL and vulnerability assessments.

    &lt;VulnDiscussion&gt;To prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling (i.e., embeddi...
    Rule Medium Severity
  • SRG-APP-000158

    <GroupDescription></GroupDescription>
    Group
  • The Tanium endpoint must have the Tanium Servers public key in its installation.

    &lt;VulnDiscussion&gt;Without cryptographic integrity protections, information can be altered by unauthorized users without detection. Remote acce...
    Rule Medium Severity
  • SRG-APP-000164

    <GroupDescription></GroupDescription>
    Group
  • The Tanium application must enforce a minimum 15-character password length.

    &lt;VulnDiscussion&gt;The shorter the password, the lower the number of possible combinations that need to be tested before the password is comprom...
    Rule Medium Severity
  • SRG-APP-000165

    <GroupDescription></GroupDescription>
    Group
  • The Tanium application must prohibit password reuse for a minimum of five generations.

    &lt;VulnDiscussion&gt;Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute...
    Rule Medium Severity
  • SRG-APP-000173

    <GroupDescription></GroupDescription>
    Group
  • Tanium must enforce 24 hours/1 day as the minimum password lifetime.

    &lt;VulnDiscussion&gt;Enforcing a minimum password lifetime helps prevent repeated password changes to defeat the password reuse or history enforce...
    Rule Medium Severity
  • SRG-APP-000174

    <GroupDescription></GroupDescription>
    Group
  • The Tanium application must enforce a 60-day maximum password lifetime restriction.

    &lt;VulnDiscussion&gt;Any password, no matter how complex, can eventually be cracked. Therefore, passwords need to be changed at specific intervals...
    Rule Medium Severity
  • SRG-APP-000175

    <GroupDescription></GroupDescription>
    Group
  • The Tanium Server certificates must have Extended Key Usage entries for the serverAuth object TLS Web Server Authentication and the clientAuth object TLS Web Client Authentication.

    &lt;VulnDiscussion&gt;Restricting this setting limits the user's ability to change their password. Passwords need to be changed at specific policy ...
    Rule Medium Severity
  • SRG-APP-000177

    <GroupDescription></GroupDescription>
    Group
  • The Tanium application must be configured for LDAP user/group synchronization to map the authenticated identity to the individual user or group account for PKI-based authentication.

    &lt;VulnDiscussion&gt;Without mapping the certificate used to authenticate to the user account, the ability to determine the identity of the indivi...
    Rule Medium Severity
  • SRG-APP-000180

    <GroupDescription></GroupDescription>
    Group
  • The Tanium application must uniquely identify and authenticate nonorganizational users (or processes acting on behalf of nonorganizational users).

    &lt;VulnDiscussion&gt;Lack of authentication and identification enables nonorganizational users to gain access to the application or possibly other...
    Rule Medium Severity
  • SRG-APP-000211

    <GroupDescription></GroupDescription>
    Group
  • The Tanium application must separate user functionality (including user interface services) from information system management functionality.

    &lt;VulnDiscussion&gt;Application management functionality includes functions necessary for administration and requires privileged user access. All...
    Rule Medium Severity
  • SRG-APP-000226

    <GroupDescription></GroupDescription>
    Group
  • The Tanium Server and Client applications must have logging enabled.

    &lt;VulnDiscussion&gt;Failure to a known state can address safety or security in accordance with the mission/business needs of the organization. Fa...
    Rule Medium Severity
  • SRG-APP-000246

    <GroupDescription></GroupDescription>
    Group
  • The Tanium application must restrict the ability of individuals to use information systems to launch organization-defined Denial of Service (DoS) attacks against other information systems.

    &lt;VulnDiscussion&gt;The Tanium Action Approval feature provides a two-person integrity control mechanism designed to achieve a high-level of secu...
    Rule Medium Severity
  • SRG-APP-000247

    <GroupDescription></GroupDescription>
    Group
  • The Tanium application must manage bandwidth throttles to limit the effects of information flooding types of Denial of Service (DoS) attacks.

    &lt;VulnDiscussion&gt;DoS is a condition when a resource is not available for legitimate users. When this occurs, the organization either cannot ac...
    Rule Medium Severity
  • SRG-APP-000267

    <GroupDescription></GroupDescription>
    Group
  • The Tanium application must reveal error messages only to the ISSO, ISSM, and SA.

    &lt;VulnDiscussion&gt;Only authorized personnel should be aware of errors and the details of the errors. Error messages are an indicator of an orga...
    Rule Medium Severity
  • SRG-APP-000270

    <GroupDescription></GroupDescription>
    Group
  • The Tanium application must employ automated mechanisms to determine the state of information system components with regard to flaw remediation using the following frequency: Continuously, where ESS is used; 30 days, for any additional internal network scans not covered by ESS; and annually, for external scans by Computer Network Defense Service Provider (CNDSP).

    &lt;VulnDiscussion&gt;Without the use of automated mechanisms to scan for security flaws on a continuous and/or periodic basis, the system componen...
    Rule Medium Severity
  • SRG-APP-000291

    <GroupDescription></GroupDescription>
    Group
  • Tanium must notify SA and ISSO when accounts are created.

    &lt;VulnDiscussion&gt;Once an attacker establishes initial access to a system, the attacker often attempts to create a persistent method of re-esta...
    Rule Medium Severity
  • SRG-APP-000292

    <GroupDescription></GroupDescription>
    Group
  • Tanium must notify system administrators and ISSO when accounts are modified.

    &lt;VulnDiscussion&gt;When application accounts are modified, user accessibility is affected. Accounts are utilized for identifying individual user...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules