Skip to content

III - Administrative Classified

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000402

    <GroupDescription></GroupDescription>
    Group
  • The Tanium application must accept Personal Identity Verification (PIV) credentials from other federal agencies.

    &lt;VulnDiscussion&gt;Access may be denied to authorized users if federal agency PIV credentials are not accepted. PIV credentials are issued by ...
    Rule Medium Severity
  • SRG-APP-000456

    <GroupDescription></GroupDescription>
    Group
  • The Tanium application must install security-relevant software updates within the time period directed by an authoritative source (e.g., IAVM, CTOs, DTMs, and STIGs).

    &lt;VulnDiscussion&gt;Security flaws with software applications are discovered daily. Vendors are constantly updating and patching their products t...
    Rule Medium Severity
  • SRG-APP-000471

    <GroupDescription></GroupDescription>
    Group
  • Tanium must alert the ISSO, ISSM, and other individuals designated by the local organization when the following Indicators of Compromise (IOCs) or potential compromise are detected: real-time intrusion detection; threats identified by authoritative sources (e.g., CTOs); and Category I, II, IV, and VII incidents in accordance with CJCSM 6510.01B.

    &lt;VulnDiscussion&gt;When a security event occurs, the application that has detected the event must immediately notify the appropriate support per...
    Rule Medium Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • Tanium Server processes must be excluded from On-Access scan.

    &lt;VulnDiscussion&gt;Similar to any other host-based applications, the Tanium Server is subject to the restrictions other system-level software ma...
    Rule Medium Severity
  • SRG-APP-000580

    <GroupDescription></GroupDescription>
    Group
  • The Tanium application must authenticate endpoint devices (servers) before establishing a local, remote, and/or network connection using bidirectional authentication that is cryptographically based.

    &lt;VulnDiscussion&gt;Without authenticating devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. B...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules