Skip to content

I - Mission Critical Classified

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000328

    <GroupDescription></GroupDescription>
    Group
  • The ability to uninstall the Tanium Client service must be disabled on all managed clients.

    &lt;VulnDiscussion&gt;By default, end users have the ability to uninstall software on their clients. In the event the Tanium Client software is uni...
    Rule Medium Severity
  • SRG-APP-000328

    <GroupDescription></GroupDescription>
    Group
  • The permissions on the Tanium Client directory must be restricted to only the SYSTEM account on all managed clients.

    &lt;VulnDiscussion&gt;By restricting access to the Tanium Client directory on managed clients, the Tanium client's ability to operate and function ...
    Rule Medium Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • Tanium Client directory and subsequent files must be excluded from On-Access scan.

    &lt;VulnDiscussion&gt;Similar to any other host-based applications, the Tanium Client is subject to the restrictions other system-level software ma...
    Rule Medium Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • Tanium endpoint files must be excluded from host-based intrusion prevention system (HIPS) intervention.

    &lt;VulnDiscussion&gt;Similar to any other host-based applications, the Tanium Client is subject to the restrictions other system-level software ma...
    Rule Medium Severity
  • SRG-APP-000002

    <GroupDescription></GroupDescription>
    Group
  • The Tanium application must retain the session lock until the user reestablishes access using established identification and authentication procedures.

    &lt;VulnDiscussion&gt;Unattended systems are susceptible to unauthorized use and should be locked when unattended. This protects critical and sensi...
    Rule Medium Severity
  • SRG-APP-000233

    <GroupDescription></GroupDescription>
    Group
  • The Tanium Application Server must be configured with a connector to sync to Microsoft Active Directory for account management functions.

    &lt;VulnDiscussion&gt;By restricting access to the Tanium Server to only Microsoft Active Directory, user accounts and related permissions can be s...
    Rule Medium Severity
  • SRG-APP-000023

    <GroupDescription></GroupDescription>
    Group
  • The Tanium Application Server must be configured to only use LDAP for account management functions.

    &lt;VulnDiscussion&gt;Enterprise environments make application account management challenging and complex. A manual process for account management ...
    Rule Medium Severity
  • SRG-APP-000033

    <GroupDescription></GroupDescription>
    Group
  • Tanium Computer Groups must be used to restrict console users from effecting changes to unauthorized computers.

    &lt;VulnDiscussion&gt;Computer Groups allow a site running Tanium to assign responsibility of specific Computer Groups to specific Tanium console u...
    Rule Medium Severity
  • SRG-APP-000033

    <GroupDescription></GroupDescription>
    Group
  • Documentation identifying Tanium console users, their respective User Groups, Computer Groups, and Roles must be maintained.

    &lt;VulnDiscussion&gt;System access should be reviewed periodically to verify that all Tanium users are assigned the appropriate functional role, w...
    Rule Medium Severity
  • SRG-APP-000033

    <GroupDescription></GroupDescription>
    Group
  • The Tanium application must be configured to use Tanium User Groups in a manner consistent with the model outlined in the environment's system documentation.

    &lt;VulnDiscussion&gt;It is important for information system owners to document authorized User Groups for the Tanium application to avoid unauthor...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules