Skip to content

III - Administrative Public

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000427

    <GroupDescription></GroupDescription>
    Group
  • The Tanium Server certificate must be signed by a DoD certificate authority (CA).

    &lt;VulnDiscussion&gt;The Tanium Server has the option to use a "self-signed" certificate or a trusted CA signed certificate for SSL connections. D...
    Rule Medium Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • Tanium Server directory and subsequent files must be excluded from On-Access scan.

    &lt;VulnDiscussion&gt;Similar to any other host-based applications, the Tanium Server is subject to the restrictions other system-level software ma...
    Rule Medium Severity
  • SRG-APP-000416

    <GroupDescription></GroupDescription>
    Group
  • The SSLCipherSuite must be configured to disable weak encryption algorithms on the Tanium Server.

    &lt;VulnDiscussion&gt;Use of weak or untested encryption algorithms undermines the purposes of using encryption to protect data. The application mu...
    Rule Medium Severity
  • SRG-APP-000001

    <GroupDescription></GroupDescription>
    Group
  • The Tanium "max_soap_sessions_total" setting must be explicitly enabled to limit the number of simultaneous sessions.

    &lt;VulnDiscussion&gt;Application management includes the ability to control the number of users and user sessions that utilize an application. Lim...
    Rule Medium Severity
  • SRG-APP-000001

    <GroupDescription></GroupDescription>
    Group
  • The Tanium "max_soap_sessions_per_user" setting must be explicitly enabled to limit the number of simultaneous sessions.

    &lt;VulnDiscussion&gt;Application management includes the ability to control the number of users and user sessions that utilize an application. Lim...
    Rule Medium Severity
  • SRG-APP-000039

    <GroupDescription></GroupDescription>
    Group
  • The Tanium documentation identifying recognized and trusted folders for Threat Response Local Directory Source must be maintained.

    &lt;VulnDiscussion&gt;Using trusted and recognized indicator of compromise (IOC) sources may detect and prevent systems from becoming compromised. ...
    Rule Medium Severity
  • SRG-APP-000039

    <GroupDescription></GroupDescription>
    Group
  • The Tanium Threat Response Local Directory Source must be configured to restrict access to only authorized maintainers of threat intel.

    &lt;VulnDiscussion&gt;Using trusted and recognized indicator of compromise (IOC) sources may detect and prevent systems from becoming compromised. ...
    Rule Medium Severity
  • SRG-APP-000039

    <GroupDescription></GroupDescription>
    Group
  • The Tanium documentation identifying recognized and trusted Security Content Automation Protocol (SCAP) sources must be maintained.

    &lt;VulnDiscussion&gt;SCAP XML documents validated by the National Institute of Standards and Technology (NIST) are provided from several possible ...
    Rule Medium Severity
  • SRG-APP-000039

    <GroupDescription></GroupDescription>
    Group
  • The Tanium documentation identifying recognized and trusted Open Vulnerability and Assessment Language (OVAL) feeds must be maintained.

    &lt;VulnDiscussion&gt;OVAL XML documents are provided from several possible sources such as the Community Intercomparison Suite (CIS) open-source r...
    Rule Medium Severity
  • SRG-APP-000039

    <GroupDescription></GroupDescription>
    Group
  • Tanium Comply must be configured to receive Security Content Automation Protocol (SCAP) content only from trusted sources.

    &lt;VulnDiscussion&gt;SCAP XML documents validated by the National Institute of Standards and Technology (NIST) are provided from several possible ...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules