Skip to content

III - Administrative Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000328

    <GroupDescription></GroupDescription>
    Group
  • The Tanium Server Logs and TDL_Logs directories must be restricted with appropriate permissions.

    &lt;VulnDiscussion&gt;Discretionary Access Control (DAC) is based on the notion that individual users are "owners" of objects and therefore have di...
    Rule Medium Severity
  • SRG-APP-000383

    <GroupDescription></GroupDescription>
    Group
  • Firewall rules must be configured on the Tanium module server to allow Server-to-Module Server communications from the Tanium Server.

    &lt;VulnDiscussion&gt;The Tanium Module Server is used to extend the functionality of Tanium through the use of various workbenches. The Tanium Mod...
    Rule Medium Severity
  • SRG-APP-000383

    <GroupDescription></GroupDescription>
    Group
  • Firewall rules must be configured on the Tanium Server for Server-to-Module Server communications.

    &lt;VulnDiscussion&gt;The Tanium Module Server is used to extend the functionality of Tanium through the use of various workbenches. The Tanium Mod...
    Rule Medium Severity
  • SRG-APP-000383

    <GroupDescription></GroupDescription>
    Group
  • Firewall rules must be configured on the Tanium Server for Server-to-Zone Server communications.

    &lt;VulnDiscussion&gt;If using the Tanium Zone Server to proxy traffic from Tanium-managed computers on less trusted network segments to the Tanium...
    Rule Medium Severity
  • SRG-APP-000416

    <GroupDescription></GroupDescription>
    Group
  • The SSLHonorCipherOrder must be configured to disable weak encryption algorithms on the Tanium Server.

    &lt;VulnDiscussion&gt;Use of weak or untested encryption algorithms undermines the purposes of using encryption to protect data. The application mu...
    Rule Medium Severity
  • SRG-APP-000427

    <GroupDescription></GroupDescription>
    Group
  • The Tanium Server certificate must be signed by a DoD certificate authority (CA).

    &lt;VulnDiscussion&gt;The Tanium Server has the option to use a "self-signed" certificate or a trusted CA signed certificate for SSL connections. D...
    Rule Medium Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • Tanium Server directory and subsequent files must be excluded from On-Access scan.

    &lt;VulnDiscussion&gt;Similar to any other host-based applications, the Tanium Server is subject to the restrictions other system-level software ma...
    Rule Medium Severity
  • SRG-APP-000416

    <GroupDescription></GroupDescription>
    Group
  • The SSLCipherSuite must be configured to disable weak encryption algorithms on the Tanium Server.

    &lt;VulnDiscussion&gt;Use of weak or untested encryption algorithms undermines the purposes of using encryption to protect data. The application mu...
    Rule Medium Severity
  • SRG-APP-000001

    <GroupDescription></GroupDescription>
    Group
  • The Tanium "max_soap_sessions_total" setting must be explicitly enabled to limit the number of simultaneous sessions.

    &lt;VulnDiscussion&gt;Application management includes the ability to control the number of users and user sessions that utilize an application. Lim...
    Rule Medium Severity
  • SRG-APP-000001

    <GroupDescription></GroupDescription>
    Group
  • The Tanium "max_soap_sessions_per_user" setting must be explicitly enabled to limit the number of simultaneous sessions.

    &lt;VulnDiscussion&gt;Application management includes the ability to control the number of users and user sessions that utilize an application. Lim...
    Rule Medium Severity
  • SRG-APP-000039

    <GroupDescription></GroupDescription>
    Group
  • The Tanium documentation identifying recognized and trusted folders for Threat Response Local Directory Source must be maintained.

    &lt;VulnDiscussion&gt;Using trusted and recognized indicator of compromise (IOC) sources may detect and prevent systems from becoming compromised. ...
    Rule Medium Severity
  • SRG-APP-000039

    <GroupDescription></GroupDescription>
    Group
  • The Tanium Threat Response Local Directory Source must be configured to restrict access to only authorized maintainers of threat intel.

    &lt;VulnDiscussion&gt;Using trusted and recognized indicator of compromise (IOC) sources may detect and prevent systems from becoming compromised. ...
    Rule Medium Severity
  • SRG-APP-000039

    <GroupDescription></GroupDescription>
    Group
  • The Tanium documentation identifying recognized and trusted Security Content Automation Protocol (SCAP) sources must be maintained.

    &lt;VulnDiscussion&gt;SCAP XML documents validated by the National Institute of Standards and Technology (NIST) are provided from several possible ...
    Rule Medium Severity
  • SRG-APP-000039

    <GroupDescription></GroupDescription>
    Group
  • The Tanium documentation identifying recognized and trusted Open Vulnerability and Assessment Language (OVAL) feeds must be maintained.

    &lt;VulnDiscussion&gt;OVAL XML documents are provided from several possible sources such as the Community Intercomparison Suite (CIS) open-source r...
    Rule Medium Severity
  • SRG-APP-000039

    <GroupDescription></GroupDescription>
    Group
  • Tanium Comply must be configured to receive Security Content Automation Protocol (SCAP) content only from trusted sources.

    &lt;VulnDiscussion&gt;SCAP XML documents validated by the National Institute of Standards and Technology (NIST) are provided from several possible ...
    Rule Medium Severity
  • SRG-APP-000039

    <GroupDescription></GroupDescription>
    Group
  • Tanium Comply must be configured to receive Open Vulnerability and Assessment Language (OVAL) feeds only from trusted sources.

    &lt;VulnDiscussion&gt;OVAL XML documents are provided from several possible sources such as the Community Intercomparison Suite (CIS) open-source r...
    Rule Medium Severity
  • SRG-APP-000435

    <GroupDescription></GroupDescription>
    Group
  • The Tanium application must limit the bandwidth used in communicating with endpoints to prevent a denial-of-service (DoS) condition at the server.

    &lt;VulnDiscussion&gt;DoS is a condition when a resource is not available for legitimate users. When this occurs, the organization either cannot ac...
    Rule Medium Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • Tanium Server files must be excluded from host-based intrusion prevention intervention.

    &lt;VulnDiscussion&gt;Similar to any other host-based applications, the Tanium Server is subject to the restrictions other system-level software ma...
    Rule Medium Severity
  • SRG-APP-000295

    <GroupDescription></GroupDescription>
    Group
  • The Tanium application must set an inactive timeout for sessions.

    &lt;VulnDiscussion&gt;Leaving sessions open indefinitely is a major security risk. An attacker can easily use an already authenticated session to a...
    Rule Medium Severity
  • SRG-APP-000435

    <GroupDescription></GroupDescription>
    Group
  • The Tanium application service must be protected from being stopped by a nonprivileged user.

    &lt;VulnDiscussion&gt;Denial of service (DoS) is a condition when a resource is not available for legitimate users. When this occurs, the organizat...
    Rule Medium Severity
  • SRG-APP-000439

    <GroupDescription></GroupDescription>
    Group
  • The Tanium Application, SQL, and Module servers must all be configured to communicate using TLS 1.2 Strict Only.

    &lt;VulnDiscussion&gt;Disabling feedback to senders when there is a failure in protocol validation format prevents adversaries from obtaining infor...
    Rule High Severity
  • SRG-APP-000439

    <GroupDescription></GroupDescription>
    Group
  • The SchUseStrongCrypto registry value must be set.

    &lt;VulnDiscussion&gt;Without protection of the transmitted information, confidentiality and integrity may be compromised since unprotected communi...
    Rule High Severity
  • SRG-APP-000439

    <GroupDescription></GroupDescription>
    Group
  • The SSLCipherSuite registry value must be set.

    &lt;VulnDiscussion&gt;Without protection of the transmitted information, confidentiality and integrity may be compromised since unprotected communi...
    Rule High Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules