III - Administrative Sensitive
Rules and Groups employed by this XCCDF Profile
-
SRG-APP-000515
<GroupDescription></GroupDescription>Group -
The application must, at a minimum, offload interconnected systems in real time and offload standalone systems weekly.
<VulnDiscussion>Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Offloading is a common ...Rule Medium Severity -
SRG-APP-000516
<GroupDescription></GroupDescription>Group -
Tanium Client processes must be excluded from On-Access scan.
<VulnDiscussion>Similar to any other host-based applications, the Tanium Client is subject to the restrictions other system-level software ma...Rule Medium Severity -
SRG-APP-000177
<GroupDescription></GroupDescription>Group -
The Tanium application must be configured for LDAP user/group synchronization to map the authenticated identity to the individual user or group account for PKI-based authentication.
<VulnDiscussion>Without mapping the certificate used to authenticate to the user account, the ability to determine the identity of the indivi...Rule Medium Severity -
SRG-APP-000180
<GroupDescription></GroupDescription>Group -
The Tanium application must uniquely identify and authenticate nonorganizational users (or processes acting on behalf of nonorganizational users).
<VulnDiscussion>Lack of authentication and identification enables nonorganizational users to gain access to the application or possibly other...Rule Medium Severity -
SRG-APP-000211
<GroupDescription></GroupDescription>Group -
The Tanium application must separate user functionality (including user interface services) from information system management functionality.
<VulnDiscussion>Application management functionality includes functions necessary for administration and requires privileged user access. All...Rule Medium Severity -
SRG-APP-000226
<GroupDescription></GroupDescription>Group -
The Tanium Server and Client applications must have logging enabled.
<VulnDiscussion>Failure to a known state can address safety or security in accordance with the mission/business needs of the organization. Fa...Rule Medium Severity -
SRG-APP-000246
<GroupDescription></GroupDescription>Group -
The Tanium application must restrict the ability of individuals to use information systems to launch organization-defined denial-of-service (DoS) attacks against other information systems.
<VulnDiscussion>The Tanium Action Approval feature provides a two-person integrity control mechanism designed to achieve a high level of secu...Rule Medium Severity -
SRG-APP-000247
<GroupDescription></GroupDescription>Group -
The Tanium application must manage bandwidth throttles to limit the effects of information flooding types of denial-of-service (DoS) attacks.
<VulnDiscussion>DoS is a condition when a resource is not available for legitimate users. When this occurs, the organization either cannot ac...Rule Medium Severity -
SRG-APP-000266
<GroupDescription></GroupDescription>Group -
The Tanium application must generate error messages that provide information necessary for corrective actions without revealing information that could be exploited by adversaries.
<VulnDiscussion>Any application providing too much information in error messages risks compromising the data and security of the application ...Rule Medium Severity -
SRG-APP-000267
<GroupDescription></GroupDescription>Group -
The Tanium application must reveal error messages only to the information system security officer (ISSO), information system security manager (ISSM), and system administrator (SA).
<VulnDiscussion>Only authorized personnel must be aware of errors and the details of the errors. Error messages are an indicator of an organi...Rule Medium Severity -
SRG-APP-000270
<GroupDescription></GroupDescription>Group -
The Tanium application must employ automated mechanisms to determine the state of information system components with regard to flaw remediation using the following frequency: continuously, where HBSS is used; 30 days, for any additional internal network scans not covered by HBSS; and annually, for external scans by Computer Network Defense Service Provider (CNDSP).
<VulnDiscussion>Without the use of automated mechanisms to scan for security flaws on a continuous and/or periodic basis, the system componen...Rule Medium Severity -
SRG-APP-000357
<GroupDescription></GroupDescription>Group -
The Tanium application must allocate audit record storage capacity in accordance with organization-defined audit record storage requirements.
<VulnDiscussion>To ensure applications have a sufficient storage capacity in which to write the audit logs, applications must be able to allo...Rule Medium Severity -
SRG-APP-000358
<GroupDescription></GroupDescription>Group -
The Tanium application must offload audit records onto a different system or media than the system being audited.
<VulnDiscussion>Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Offloading is a common ...Rule Medium Severity -
SRG-APP-000359
<GroupDescription></GroupDescription>Group -
The Tanium application must provide an immediate warning to the system administrator and information system security officer (at a minimum) when allocated audit record storage volume reaches 75% of repository maximum audit record storage capacity.
<VulnDiscussion>If security personnel are not notified immediately upon storage volume utilization reaching 75%, they are unable to plan for ...Rule Medium Severity -
SRG-APP-000360
<GroupDescription></GroupDescription>Group -
The Tanium application must provide an immediate real-time alert to the system administrator and information system security officer, at a minimum, of all audit failure events requiring real-time alerts.
<VulnDiscussion>It is critical for the appropriate personnel to be aware if a system is at risk of failing to process audit logs as required....Rule Medium Severity -
SRG-APP-000378
<GroupDescription></GroupDescription>Group -
The Tanium application must prohibit user installation of software without explicit privileged status.
<VulnDiscussion>Allowing regular users to install software, without explicit privileges, creates the risk that untested or potentially malici...Rule Medium Severity -
SRG-APP-000380
<GroupDescription></GroupDescription>Group -
The application must enforce access restrictions associated with changes to application configuration.
<VulnDiscussion>Failure to provide logical access restrictions associated with changes to application configuration may have significant effe...Rule Medium Severity -
SRG-APP-000386
<GroupDescription></GroupDescription>Group -
The application must employ a deny-all, permit-by-exception (allowlist) policy to allow the execution of authorized software programs.
<VulnDiscussion>Using an allowlist provides a configuration management method for allowing the execution of only authorized software. Using o...Rule Medium Severity -
SRG-APP-000391
<GroupDescription></GroupDescription>Group -
The Tanium application must accept Personal Identity Verification (PIV) credentials.
<VulnDiscussion>The use of PIV credentials facilitates standardization and reduces the risk of unauthorized access. DoD has mandated the use...Rule Medium Severity -
SRG-APP-000392
<GroupDescription></GroupDescription>Group -
The Tanium application must electronically verify Personal Identity Verification (PIV) credentials.
<VulnDiscussion>The use of PIV credentials facilitates standardization and reduces the risk of unauthorized access. DoD has mandated the use...Rule Medium Severity -
SRG-APP-000402
<GroupDescription></GroupDescription>Group -
The Tanium application must accept Personal Identity Verification (PIV) credentials from other federal agencies.
<VulnDiscussion>Access may be denied to authorized users if federal agency PIV credentials are not accepted. PIV credentials are issued by ...Rule Medium Severity -
SRG-APP-000456
<GroupDescription></GroupDescription>Group -
The Tanium application must install security-relevant software updates within the time period directed by an authoritative source (e.g., IAVM, CTOs, DTMs, and STIGs).
<VulnDiscussion>Security flaws with software applications are discovered daily. Vendors are constantly updating and patching their products t...Rule Medium Severity -
SRG-APP-000471
<GroupDescription></GroupDescription>Group -
Tanium must alert the ISSO, ISSM, and other individuals designated by the local organization when the following Indicators of Compromise (IOCs) or potential compromise are detected: real-time intrusion detection; threats identified by authoritative sources (e.g., CTOs); and Category I, II, IV, and VII incidents in accordance with CJCSM 6510.01B.
<VulnDiscussion>When a security event occurs, the application that has detected the event must immediately notify the appropriate support per...Rule Medium Severity -
SRG-APP-000516
<GroupDescription></GroupDescription>Group -
Tanium Server processes must be excluded from On-Access scan.
<VulnDiscussion>Similar to any other host-based applications, the Tanium Server is subject to the restrictions other system-level software ma...Rule Medium Severity -
SRG-APP-000580
<GroupDescription></GroupDescription>Group -
The Tanium application must authenticate endpoint devices (servers) before establishing a local, remote, and/or network connection using bidirectional authentication that is cryptographically based.
<VulnDiscussion>Without authenticating devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. B...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.