Skip to content

III - Administrative Sensitive

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000402

    <GroupDescription></GroupDescription>
    Group
  • The Tanium application must accept Personal Identity Verification (PIV) credentials from other federal agencies.

    &lt;VulnDiscussion&gt;Access may be denied to authorized users if federal agency PIV credentials are not accepted. PIV credentials are issued by ...
    Rule Medium Severity
  • SRG-APP-000456

    <GroupDescription></GroupDescription>
    Group
  • The Tanium application must install security-relevant software updates within the time period directed by an authoritative source (e.g., IAVM, CTOs, DTMs, and STIGs).

    &lt;VulnDiscussion&gt;Security flaws with software applications are discovered daily. Vendors are constantly updating and patching their products t...
    Rule Medium Severity
  • SRG-APP-000471

    <GroupDescription></GroupDescription>
    Group
  • Tanium must alert the ISSO, ISSM, and other individuals designated by the local organization when the following Indicators of Compromise (IOCs) or potential compromise are detected: real-time intrusion detection; threats identified by authoritative sources (e.g., CTOs); and Category I, II, IV, and VII incidents in accordance with CJCSM 6510.01B.

    &lt;VulnDiscussion&gt;When a security event occurs, the application that has detected the event must immediately notify the appropriate support per...
    Rule Medium Severity
  • SRG-APP-000516

    <GroupDescription></GroupDescription>
    Group
  • Tanium Server processes must be excluded from On-Access scan.

    &lt;VulnDiscussion&gt;Similar to any other host-based applications, the Tanium Server is subject to the restrictions other system-level software ma...
    Rule Medium Severity
  • SRG-APP-000580

    <GroupDescription></GroupDescription>
    Group
  • The Tanium application must authenticate endpoint devices (servers) before establishing a local, remote, and/or network connection using bidirectional authentication that is cryptographically based.

    &lt;VulnDiscussion&gt;Without authenticating devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. B...
    Rule Medium Severity
  • SRG-APP-000015

    <GroupDescription></GroupDescription>
    Group
  • The Tanium endpoint must have the Tanium Server's pki.db in its installation.

    &lt;VulnDiscussion&gt;Without cryptographic integrity protections in the Tanium Client, information could be altered by unauthorized users without ...
    Rule Medium Severity
  • SRG-APP-000119

    <GroupDescription></GroupDescription>
    Group
  • Access to Tanium logs on each endpoint must be restricted by permissions.

    &lt;VulnDiscussion&gt;For the Tanium Client software to run without impact from external negligent or malicious changes, the permissions on the Tan...
    Rule Medium Severity
  • SRG-APP-000131

    <GroupDescription></GroupDescription>
    Group
  • The Tanium cryptographic signing capabilities must be enabled on the Tanium Clients to safeguard the authenticity of communications sessions when answering requests from the Tanium Server.

    &lt;VulnDiscussion&gt;All of Tanium's signing capabilities should be enabled upon install. Tanium supports the cryptographic signing and verificati...
    Rule Medium Severity
  • SRG-APP-000142

    <GroupDescription></GroupDescription>
    Group
  • Firewall rules must be configured on the Tanium endpoints for client-to-server communications.

    &lt;VulnDiscussion&gt;In addition to the client-to-server TCP communication that takes place over port 17472, Tanium Clients also communicate to ot...
    Rule Medium Severity
  • SRG-APP-000328

    <GroupDescription></GroupDescription>
    Group
  • Control of the Tanium Client service must be restricted to SYSTEM access only for all managed clients.

    &lt;VulnDiscussion&gt;The reliability of the Tanium client's ability to operate depends on controlling access to the Tanium client service. By rest...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules