Tanium 6.5 Security Technical Implementation Guide

  • Version/Release: V1R3
  • Published: 2020-03-25
  • Expand All:
  • Severity:
  • Sort:
Compare

Select any two versions of this STIG to compare the individual requirements

View

Select any old version/release of this STIG to view the previous requirements

This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via e-mail to the following address: disa.stig_spt@mail.mil.
b
The Tanium endpoint must have the Tanium Servers public key in its installation.
AC-17 - Medium - CCI-001453 - V-66971 - SV-81461r1_rule
RMF Control
AC-17
Severity
Medium
CCI
CCI-001453
Version
TANS-CL-000001
Vuln IDs
  • V-66971
Rule IDs
  • SV-81461r1_rule
Without cryptographic integrity protections, information can be altered by unauthorized users without detection. Remote access is access to DoD nonpublic information systems by an authorized user (or an information system) communicating through an external, non-organization-controlled network. Remote access methods include, for example, dial-up, broadband, and wireless. Cryptographic mechanisms used for protecting the integrity of information include, for example, signed hash functions using asymmetric cryptography enabling distribution of the public key to verify the hash information while maintaining the confidentiality of the secret key used to generate the hash.
Checks: C-67607r1_chk

The Tanium endpoint makes a connection to the Tanium Server, the endpoint's copy of the Tanium Server's public key is used to verify the validity of the registration day coming from the Tanium Server. If any endpoint systems do not have the correct Tanium Server public key in its configuration, they will not perform any instructions from the Tanium Server and a record of those endpoints will be listed in the Tanium Server's System Status. To validate, Review in console--Administration, System Status, to determine if any endpoints connected with an invalid key. If any systems are listed with "No" under the column for "Valid Key", this is a finding.

Fix: F-73071r1_fix

For systems which do not have a valid key for the Tanium Server, re-deploy the client software from Tanium.

b
Access to Tanium logs on each endpoint must be restricted by permissions.
AU-9 - Medium - CCI-000163 - V-66973 - SV-81463r1_rule
RMF Control
AU-9
Severity
Medium
CCI
CCI-000163
Version
TANS-CL-000002
Vuln IDs
  • V-66973
Rule IDs
  • SV-81463r1_rule
For the Tanium Client software to run without impact from external negligent or malicious changes, the permissions on the Tanium log files and their directory must be restricted. Tanium is deployed with a Client Hardening Solution. This solution, when applied, will ensure directory permissions are in place.
Checks: C-67609r1_chk

Using a web browser on a system that has connectivity to the Tanium Server, access the Tanium Server web user interface (UI) and log on with CAC. On the Dashboard, select "Client Hardening Tool". Select the "Set Client Directory Permissions". Tanium will parse the script and return a row for "Restricted" and a row for "Not Restricted", with their respective client counts. If the "Not Restricted" row shows a client count of more than "0", this is a finding.

Fix: F-73073r1_fix

Using a web browser on a system that has connectivity to the Tanium Server, access the Tanium Server web user interface (UI) and log on with CAC. On the Dashboard, select "Client Hardening Tool". Select the "Set Client Directory Permissions". Tanium will parse the script and return a row for "Restricted" and a row for "Not Restricted", with their respective client counts. Click on the "Not Restricted" row and right-click. Select "Deploy Action". In the "Deploy Action" dialog box, the package "Client Service Hardening - Set SYSTEM only permissions on Tanium Client directory" will be selected. The clients which have their Tanium Client directory "Not Restricted" will be displayed in the bottom window. Click on "Target & Schedule". Choose a schedule to deploy the hardening. Click on "Finish". Verify settings and click on "Confirm".

b
The Tanium cryptographic signing capabilities must be enabled on the Tanium Server.
CM-5 - Medium - CCI-001749 - V-66975 - SV-81465r2_rule
RMF Control
CM-5
Severity
Medium
CCI
CCI-001749
Version
TANS-CL-000003
Vuln IDs
  • V-66975
Rule IDs
  • SV-81465r2_rule
All of Tanium's signing capabilities should be enabled upon install. Tanium supports the cryptographic signing and verification before execution of all Sensors, Questions, Actions, Sensor Libraries, File Shards, etc. Enabling signing does away with the ability of an attacker to conduct Man in the Middle (MitM) attacks for the purposes of remote code execution and precludes the modification of the aforementioned data elements in transit. Additionally, Tanium supports object level signing for content ingested into the Tanium platform. This allows for the detection and rejection of changes to objects (sensors, actions, etc.) by even a privileged user within Tanium. Tanium has built-in signing capabilities enabled by default when installed. Cryptographic signing and verification of all Sensors, Questions, Actions, Sensor Libraries, File Shards, etc. before execution will be enforced by Tanium. Signing will prevent MitM remote code execution attacks and will protect data element in transit. Tanium also supports object level signing for content within the Tanium platform.
Checks: C-67611r1_chk

Using a web browser on a system that has connectivity to the Tanium Server, access the Tanium Server web user interface (UI) and log on with CAC. Click on "Administration". Select the "Global Settings" tab. In the search box beside "Show Settings Containing:" type "AllQuestionsRequireSignatureFlag". Enter. If no results are returned, this is a finding since this setting needs to be explicitly set. If results are returned for “AllQuestionsRequireSignatureFlag” but the value is not "1", this is a finding.

Fix: F-73075r1_fix

Using a web browser on a system that has connectivity to the Tanium Server, access the Tanium Server web user interface (UI) and log on with CAC. Click on "Administration". Select the "Global Settings" tab. Click on "+ Add New Setting". In "Create New Setting" dialog box enter "sign_all_questions_flag" for "Setting Name:". Enter "1" for "Setting Value:". Select "Numeric" from "Value Type" drop-down list. Select "Clients" from "Affects" drop-down list. Click “Save”. Click on "Administration". Select the "Global Settings" tab. Click on "+ Add New Setting". In "Create New Setting" dialog box, enter "AllQuestionsRequireSignatureFlag" for "Setting Name:". Enter "1" for "Setting Value:". Select "Numeric" from "Value Type" drop-down list. Select "Clients" from "Affects" drop-down list. Click “Save”.

b
Firewall rules must be configured on the Tanium Endpoints for Client-to-Server communications.
CM-7 - Medium - CCI-000382 - V-66977 - SV-81467r1_rule
RMF Control
CM-7
Severity
Medium
CCI
CCI-000382
Version
TANS-CL-000004
Vuln IDs
  • V-66977
Rule IDs
  • SV-81467r1_rule
In addition to the client-to-server TCP communication that takes place over port 17472, Tanium Clients also communicate to other Tanium-managed computers over port 17472. The Tanium environment can perform hundreds or thousands of times faster than other security or systems management tools because the Tanium Clients communicate in secure, linearly-controlled peer-to-peer rings. Because clients dynamically communicate with other nearby agents based on proximity and latency, rings tend to form automatically to match a customer's topology--endpoints in California will form one ring while endpoints in Germany will form a separate ring. https://kb.tanium.com/Port_Configuration_v6.5
Checks: C-67613r1_chk

Note: This check is performed for the Tanium Endpoints and must be validated against the HBSS desktop firewall policy applied to the Endpoints. Consult with the HBSS administration for assistance. Validate a rule exists within the HBSS HIPS firewall policies for managed clients for the following: Port Needed: Tanium Clients or Zone Clients over TCP port 17472, bi-directionally. If a host-based firewall rule does not exist to allow TCP port 17472, bi-directionally, this is a finding. Consult with the network firewall administrator and validate rules exist for the following: Allow TCP traffic on port 17472 from any computer to be managed on a local area network to any other computer to be managed on the same local area network. If a network firewall rule does not exist to allow TCP port 17472 from any managed computer to any other managed computer on the same local area network, this is a finding.

Fix: F-73077r1_fix

Configure host-based and network firewall rules as required.

b
Control of the Tanium Client service must be restricted to SYSTEM access only for all managed clients.
AC-3 - Medium - CCI-002165 - V-66979 - SV-81469r1_rule
RMF Control
AC-3
Severity
Medium
CCI
CCI-002165
Version
TANS-CL-000005
Vuln IDs
  • V-66979
Rule IDs
  • SV-81469r1_rule
The reliability of the Tanium client's ability to operate depends upon controlling access to the Tanium client service. By restricting access to SYSTEM access only, the non-Tanium system administrator will not have the ability to impact operability of the service.
Checks: C-67615r1_chk

Using a web browser on a system that has connectivity to the Tanium Server, access the Tanium Server web user interface (UI) and log on with CAC. From the Dashboard, under "Client Service Hardening", click on "Control Service State Permissions". The results will show a "Count" of clients matching the "Service Control is set to default permissions" query. If the "Count" shows any quantity other than zero, this is a finding.

Fix: F-73079r1_fix

Using a web browser on a system that has connectivity to the Tanium Server, access the Tanium Server web user interface (UI) and log on with CAC. From the Dashboard, under "Client Service Hardening", click on "Control Service State Permissions". The results will show a "Count" of clients matching the "Service Control is set to default permissions" query. Select the result line for "Service Control is set to default permissions". Right-click on the number under "Count". Choose "Deploy Action...". The "Deploy Action" dialog box will display "Client Service Hardening - Set Service Permissions to Defaults" as the package. -> Client Service Hardening - Set SYSTEM only permissions on Tanium Client directory. The computer names comprising the "Count" of non-compliant systems will be displayed in the bottom. Click on "Target & Schedule". Configure the schedule for the requested action depending upon internal organizational procedures and policies for maintenance. Click on "Finish". Verify settings are correct. Click on the "Confirm..." button at the bottom of the screen which will respond with a dialog box "Your action has been scheduled. It can be viewed on the actions tab."

b
The ability to uninstall the Tanium Client service must be disabled on all managed clients.
AC-3 - Medium - CCI-002165 - V-66981 - SV-81471r1_rule
RMF Control
AC-3
Severity
Medium
CCI
CCI-002165
Version
TANS-CL-000006
Vuln IDs
  • V-66981
Rule IDs
  • SV-81471r1_rule
By default, end users have the ability to uninstall software on their clients. In the event the Tanium Client software is uninstalled, the Tanium Server is unable to manage the client and must re-deploy to the client. Preventing the software from being displayed in the client's Add/Remove Programs will lessen the risk of the software being uninstalled by non-Tanium System Administrators.
Checks: C-67617r1_chk

Using a web browser on a system that has connectivity to the Tanium Server, access the Tanium Server web user interface (UI) and log on with CAC. From the Dashboard, under "Client Service Hardening", click on "Hide From Add-Remove Programs". The results will show a "Count" of clients matching the "Tanium Client Visible in Add-Remove Programs" query. If the "Count" shows any quantity other than zero, this is a finding.

Fix: F-73081r1_fix

Using a web browser on a system that has connectivity to the Tanium Server, access the Tanium Server web user interface (UI) and log on with CAC. From the Dashboard, under "Client Service Hardening", click on "Hide From Add-Remove Programs". The results will show a "Count" of clients matching the "Tanium Client Visible in Add-Remove Programs" query. Select the result line. Right-click on the number under "Count". Choose "Deploy Action...". The "Deploy Action" dialog box will display "Client Service Hardening - Hide Client from Add-Remove Programs" as the package. The computer names comprising the "Count" of non-compliant systems will be displayed in the bottom. Click on "Target & Schedule". Configure the schedule for the requested action depending upon internal organizational procedures and policies for maintenance. Click on "Finish". Verify settings are correct. Click on the "Confirm..." button at the bottom of the screen which will respond with a dialog box "Your action has been scheduled. It can be viewed on the actions tab."

b
The permissions on the Tanium Client directory must be restricted to only the SYSTEM account on all managed clients.
AC-3 - Medium - CCI-002165 - V-66983 - SV-81473r2_rule
RMF Control
AC-3
Severity
Medium
CCI
CCI-002165
Version
TANS-CL-000007
Vuln IDs
  • V-66983
Rule IDs
  • SV-81473r2_rule
By restricting access to the Tanium Client directory on managed clients, the Tanium client's ability to operate and function as designed will be protected from malicious attack and unintentional modifications by end users.
Checks: C-67619r1_chk

Using a web browser on a system that has connectivity to the Tanium Server, access the Tanium Server web user interface (UI) and log on with CAC. From the Dashboard, under "Client Service Hardening", click on "Control Service State Permissions". The results will show a "Count" of clients with restricted and non-restricted permissions for "Tanium Client Service". Non-compliant clients will have a count other than 0 for "Service Control is set to default permissions" or "Unknown Service Control Permissions. If there is a "Count" other than "0" for "Service Control is set to default permissions" or "Unknown Service Control Permissions", this is a finding.

Fix: F-73083r1_fix

Using a web browser on a system that has connectivity to the Tanium Server, access the Tanium Server web user interface (UI) and log on with CAC. From the Dashboard, under "Client Service Hardening", click on "Control Service State Permissions". The results will show a "Count" of clients' compliant and non-compliant hardening for the "Tanium Client Service". Non-compliant clients will have a count other than 0 for "Service Control is set to default permissions" or "Unknown Service Control Permissions. Select each of the ""Service Control is set to default permissions" or "Unknown Service Control Permissions." statuses, right-click and select "Deploy Action...." The "Deploy Action" dialog box will display "Client Service Hardening - Control Service State Permissions" as the package. The computer names comprising the "Count" of non-compliant systems will be displayed in the bottom. Click on "Target & Schedule". Configure the schedule for the requested action depending upon internal organizational procedures and policies for maintenance. Click on "Finish". Verify settings are correct. Click on the "Confirm..." button at the bottom of the screen which will respond with a dialog box "Your action has been scheduled. It can be viewed on the actions tab."

b
Tanium endpoint files must be protected from antivirus actions.
CM-6 - Medium - CCI-000366 - V-66985 - SV-81475r1_rule
RMF Control
CM-6
Severity
Medium
CCI
CCI-000366
Version
TANS-CL-000008
Vuln IDs
  • V-66985
Rule IDs
  • SV-81475r1_rule
Similar to any other host-based applications, the Tanium Client is subject to the restrictions other System-level software may place on an operating environment. That is to say that Antivirus, Encryption, or other security and management stack software may disallow the Client from working as expected. https://kb.tanium.com/Security_Software_Exceptions
Checks: C-67621r1_chk

Consult with the Tanium System Administrator to determine the antivirus used on the Tanium clients. Review the settings of the antivirus software. Validate exclusions exist which exclude the Tanium program files from being scanned by antivirus. If exclusions do not exist, this is a finding.

Fix: F-73085r1_fix

Implement exclusion policies within the antivirus software solution to exclude the scanning of Tanium program files.

b
The Tanium Client - Set Action Lock must be set to OFF during maintenance window timeframes only.
CM-6 - Medium - CCI-000366 - V-66987 - SV-81477r1_rule
RMF Control
CM-6
Severity
Medium
CCI
CCI-000366
Version
TANS-CL-000009
Vuln IDs
  • V-66987
Rule IDs
  • SV-81477r1_rule
Set Action Lock On will prevent any managed system from executing Tanium generated actions. This functionality is helpful when needing to eliminate systems from taking actions (e.g. patch scanning/installation, unmanaged asset scanning, updating, etc.), whether it is automatically scheduled upon install or manually scheduled. This functionality can also be used to help debug performance issues on a client if there is a fear that Tanium is running an action that could be causing a negative impact. Setting Action Lock Off will ensure any Tanium generated actions are executed at the endpoint.
Checks: C-67623r1_chk

Using a web browser on a system that has connectivity to the Tanium Server, access the Tanium Server web user interface (UI) and log on with CAC. In the “Home” tab, locate the Tanium Administration dashboard. Click on “Client Configuration”. The results will display two windows. One window will show "Clients that can take actions - Action Lock Off" and the other window will show "Clients that cannot take actions - Action Lock On". If any systems are listed in the "Clients that cannot take actions - Action Lock Off" window and it is not an official maintenance window timeframe for those systems, this is a finding.

Fix: F-73087r1_fix

Using a web browser on a system that has connectivity to the Tanium Server, access the Tanium Server web user interface (UI) and log on with CAC. In the “Home” tab, locate the Tanium Administration dashboard. Click on “Client Configuration”. The results will display two windows. One window will show "Clients that can take actions - Action Lock Off" and the other window will show "Clients that cannot take actions - Action Lock On". In the windows displaying systems with Action Lock Off, highlight to select all systems displayed. Right-click and choose "Deploy Action".

b
The Tanium Client Deployment Tool (CDT) must not be configured to use the psexec method of deployment.
CM-6 - Medium - CCI-000366 - V-66989 - SV-81479r1_rule
RMF Control
CM-6
Severity
Medium
CCI
CCI-000366
Version
TANS-CL-000010
Vuln IDs
  • V-66989
Rule IDs
  • SV-81479r1_rule
When using the Tanium Client Deployment Tool (CDT), using psexec represents an increased vulnerability as the NTLM hash and clear text passwords of the authenticating user is exposed in the memory of the remote system. To mitigate this vulnerability, the psexec method of deployment must not be used.
Checks: C-67625r1_chk

NOTE: The Tanium Server uses a renamed version of the psexec tool to be used when deploying packages to clients. In order to ensure psexec is not used, the renamed psexect.exe must be removed from the Tanium Server directory. Access the Tanium Server interactively. Log on with an account with administrative privileges to the server. Navigate to \Program Files(x86)\Tanium\Tanium Client Deployment Tool folder. If the file "psexect.exe" exists, this is a finding.

Fix: F-73089r1_fix

Access the Tanium Server interactively. Log on with an account with administrative privileges to the server. Navigate to \Program Files(x86)\Tanium\Tanium Client Deployment Tool folder. Remove the file "psexect.exe".

b
The Tanium Client must ensure the authenticity of communications sessions when answering requests from the Tanium Server.
SC-23 - Medium - CCI-001184 - V-66991 - SV-81481r1_rule
RMF Control
SC-23
Severity
Medium
CCI
CCI-001184
Version
TANS-CL-000011
Vuln IDs
  • V-66991
Rule IDs
  • SV-81481r1_rule
Authenticity protection provides protection against man-in-the-middle attacks/session hijacking and the insertion of false information into sessions. Application communication sessions are protected utilizing transport encryption protocols, such as SSL or TLS. SSL/TLS provides web applications with a means to be able to authenticate user sessions and encrypt application traffic. Session authentication can be single (one-way) or mutual (two-way) in nature. Single authentication authenticates the server for the client, whereas mutual authentication provides a means for both the client and the server to authenticate each other. This requirement applies to applications that utilize communications sessions. This includes, but is not limited to, web-based applications and Service-Oriented Architectures (SOA). This requirement addresses communications protection at the application session, versus the network packet, and establishes grounds for confidence at both ends of communications sessions in ongoing identities of other parties and in the validity of information transmitted. Depending on the required degree of confidentiality and integrity, web services/SOA will require the use of SSL/TLS mutual authentication (two-way/bidirectional).
Checks: C-67627r1_chk

Using a web browser on a system that has connectivity to the Tanium Server, access the Tanium Server web user interface (UI) and log on with CAC. Click on "Administration". Select the "Global Settings" tab. In the search box beside "Show Settings Containing:" type "AllQuestionsRequireSignatureFlag". Enter. If no results are returned, this is a finding since this setting needs to be explicitly set. If results are returned for "AllQuestionsRequireSignatureFlag" but the value is not "1", this is a finding.

Fix: F-73091r1_fix

Using a web browser on a system that has connectivity to the Tanium Server, access the Tanium Server web user interface (UI) and log on with CAC. Click on "Administration". Select the "Global Settings" tab. Click on "+ Add New Setting". In "Create New Setting" dialog box, enter "AllQuestionsRequireSignatureFlag" for "Setting Name:". Enter "1" for "Setting Value:". Select "Numeric" from "Value Type" drop-down list. Select "Clients" from "Affects" drop-down list. Click “Save”.

b
Tanium endpoint files must be protected from file encryption actions.
CM-6 - Medium - CCI-000366 - V-66993 - SV-81483r1_rule
RMF Control
CM-6
Severity
Medium
CCI
CCI-000366
Version
TANS-CL-000012
Vuln IDs
  • V-66993
Rule IDs
  • SV-81483r1_rule
Similar to any other host-based applications, the Tanium Client is subject to the restrictions other System-level software may place on an operating environment. That is to say that Antivirus, Encryption, or other security and management stack software may disallow the Client from working as expected. https://kb.tanium.com/Security_Software_Exceptions
Checks: C-67629r1_chk

Consult with the Tanium System Administrator to determine the file encryption software used on the Tanium clients. Review the settings for the file encryption software. Validate exclusions exist which exclude the Tanium program files from being encrypted by the file encryption software. If exclusions do not exist, this is a finding.

Fix: F-73093r1_fix

Implement excluding policies within the file encryption software solution to exclude the file level encryption of the Tanium program files.

c
The Tanium Console_ProhibitSavedLogin option must be explicitly enabled to prevent console browsers from saving non-CAC logon information.
AC-11 - High - CCI-000060 - V-66995 - SV-81485r1_rule
RMF Control
AC-11
Severity
High
CCI
CCI-000060
Version
TANS-CN-000001
Vuln IDs
  • V-66995
Rule IDs
  • SV-81485r1_rule
The Tanium Console, by default, can cache console users' credentials for convenience so that operators are not required to re-enter their passwords when logging back into the console. When this feature is enabled, there is a risk of access by individuals other than the original console user. Depending upon the original console user's privileges, such access could result in irreversible or malicious manipulation of the Tanium configuration. Although this option is not an impact when CAC is enabled, this feature should be explicitly disabled in the event CAC authentication is ever broken or removed.
Checks: C-67631r1_chk

Using a web browser on a system which has connectivity to the Tanium Server, access the Tanium Server web user interface (UI) and logon with CAC. Click on "Administration". Select the "Global Settings" tab. In the search box beside "Show Settings Containing:" type "console_prohibitSavedLogin". Enter. If no results are returned, this is a finding. If results are returned for "console_prohibitSavedLogin", but the value is not "1", this is a finding.

Fix: F-73095r1_fix

Using a web browser on a system which has connectivity to the Tanium Server, access the Tanium Server web user interface (UI) and logon with CAC. Click on "Administration". Select the "Global Settings" tab. Click on "+ Add New Setting". In "Create New Setting" dialog box enter "console_prohibitSavedLogin" for "Setting Name:". Enter "1" for "Setting Value:". Select "Numeric" from "Value Type" drop-down list. Select "Server" from "Affects drop-down list. Click Save.

b
The Tanium Application Server must be configured with a connector to sync to Microsoft Active Directory for account management functions.
AC-2 - Medium - CCI-000015 - V-66997 - SV-81487r1_rule
RMF Control
AC-2
Severity
Medium
CCI
CCI-000015
Version
TANS-CN-000002
Vuln IDs
  • V-66997
Rule IDs
  • SV-81487r1_rule
By restricting access to the Tanium Server to only Microsoft Active Directory, user accounts and related permissions can be strictly monitored. Account management will be under the operational responsibility of the System Administrator for the Windows Operation System Active Directory.
Checks: C-67633r1_chk

Access the Tanium Module server interactively and log on as an Administrator. Click “Start” and click the down arrow to view Apps. Find "Tanium Connection Manager", right-click on the icon and choose to Run-as administrator and confirm at the User Account Control window prompt. In the "Tanium Connection Manager" configuration window, select the "Connector Plug-Ins" tab. Verify a plug-in exists for the "Type of Active Directory Sync". If no plug-in exists with the "Type of Active Directory Sync", this is a finding.

Fix: F-73097r1_fix

Access the Tanium Module server interactively and log on as an Administrator. Click “Start” and click the down arrow to view Apps. Find Tanium Connection Manager, right-click on the icon and choose to Run-as administrator and confirm. In the Tanium Connection Manager configuration window, select the "Connector Plug-Ins" tab. Click the + to add a connector For Connector Type:, choose Active Directory Sync Assign a unique Connector Name: Click “OK”. Configure Active Directory and configuration tabs with variables according to site's Active Directory configuration.

b
The Tanium Application Server must be configured to only use Microsoft Active Directory for account management functions.
AC-2 - Medium - CCI-000015 - V-66999 - SV-81489r1_rule
RMF Control
AC-2
Severity
Medium
CCI
CCI-000015
Version
TANS-CN-000003
Vuln IDs
  • V-66999
Rule IDs
  • SV-81489r1_rule
By restricting access to the Tanium Server to only Microsoft Active Directory, user accounts and related permissions can be strictly monitored. Account management will be under the cog of the Windows Operating System and separate maintenance will not be required.
Checks: C-67635r1_chk

Access the Tanium App server through interactive logon. Run regedit as Administrator. Navigate to HKLM\Software\Wow6432Node\Tanium\Tanium Server. Validate the "cac_ldap_server_url" value exists and is configured to point to the site's Active Directory instance. This registry value requires that Tanium validate every CAC/PIV authentication attempt with AD to determine the state of the account that is logging in. It must use the syntax of LDAP://<AD instance FQDN> (Note: All CAPS for LDAP). If the value for "cac_ldap_server_url" does not exist or is not configured to the site's AD instance, this is a finding.

Fix: F-73099r1_fix

Access the Tanium App server through interactive logon. Run regedit as Administrator. Navigate to HKLM\Software\Wow6432Node\Tanium\Tanium Server. Set the value for "cac_ldap_server_url" to reference the site's AD instance. It must use the syntax of LDAP://<AD instance FQDN> (Note: All CAPS for LDAP).

b
Computer Groups must be used to restrict console users from affecting changes to unauthorized computers.
AC-3 - Medium - CCI-000213 - V-67001 - SV-81491r1_rule
RMF Control
AC-3
Severity
Medium
CCI
CCI-000213
Version
TANS-CN-000004
Vuln IDs
  • V-67001
Rule IDs
  • SV-81491r1_rule
Computer Groups allow a site running Tanium to assign responsibility of specific Computer Groups to specific Tanium console users. By doing so, a desktop administrator, for example, will not have the ability to enforce an action against a high visibility server. For large sites, it is crucial to have the Computer Groups and while a smaller site might not seem to require Computer Groups, creating them provides for a cleaner implementation. All sites will be required to have some kind of Computer Groups configured other than the default "All Computers".
Checks: C-67637r1_chk

Using a web browser on a system that has connectivity to the Tanium Server, access the Tanium Server web user interface (UI) and log on with CAC. Click on "Administration". Select the "Computer Groups" tab. Under the "Group Name" column, verify specific groups exist other than the default "All Computers" and "No Computers". If site or organization specific computer groups do not exist, this is a finding.

Fix: F-73101r1_fix

Using a web browser on a system that has connectivity to the Tanium Server, access the Tanium Server web user interface (UI) and log on with CAC. Click on "Administration". Select the "Computer Groups" tab. Configure specific Computer Groups in order to facilitate the management of computers by authorized individuals for those computers. Note: Active Directory Computer Groups may also be used to sync with Tanium Computer Groups as a means to satisfy this requirement.

b
Documentation identifying Tanium console users and their respective User Roles must be maintained.
AC-3 - Medium - CCI-000213 - V-67003 - SV-81493r1_rule
RMF Control
AC-3
Severity
Medium
CCI
CCI-000213
Version
TANS-CN-000005
Vuln IDs
  • V-67003
Rule IDs
  • SV-81493r1_rule
System access should be reviewed periodically to verify that all Tanium users are assigned the appropriate role, with the least privileged access possible to perform assigned tasks being the recommended best practice. Users who have been removed from the documentation should no longer be configured as a Tanium Console User. Consider removing users that have not logged onto the system within a predetermined time frame. When using Active Directory synchronization, as is required by this STIG, User Roles assignments are via the AD Sync connector. AD security groups correlate, one to one, to Tanium User Roles. To change a Tanium user's User Role, their Active Directory account needs to be moved to the AD security group which correlates with the applicable User Role.
Checks: C-67639r1_chk

Consult with the Tanium System Administrator to review the documented list of Tanium users. The users' respective, approved roles, as well as the correlated Active Directory security group for the User Roles, must be documented. If the site does not have the Tanium users and their respective, approved roles and AD security groups documented, this is a finding.

Fix: F-73103r1_fix

Prepare and maintain documentation identifying the Tanium console users and their respective User Roles and AD security groups.

c
Role-based system access must be configured to least privileged access to Tanium Server functions through the Tanium interface.
AC-3 - High - CCI-000213 - V-67005 - SV-81495r1_rule
RMF Control
AC-3
Severity
High
CCI
CCI-000213
Version
TANS-CN-000006
Vuln IDs
  • V-67005
Rule IDs
  • SV-81495r1_rule
User accessibility to various Tanium Server functions performed via the console can be restricted by User Roles. Those User Roles are: Administrator, Read Only User, Question Author, Action User, Action Approver, Action Author, Sensor Author, Action/Sensor Author, and Content Administrator. These are already configured in Tanium. System access should be reviewed periodically to verify that all Tanium users are assigned the appropriate role, with the least privileged access possible to perform assigned tasks being the recommended best practice. Consider removing users that have not logged onto the system within a predetermined time frame.
Checks: C-67641r1_chk

Consult with the Tanium System Administrator to review the documented list of Tanium users. Review the users' respective approved roles, as well as the correlated Active Directory security group for the User Roles. Validate Active Directory security groups/Tanium roles are documented to assign least privileged access to the functions of the Tanium Server through the Tanium interface. If the documentation does not reflect a granular, least privileged access approach to the Active Directory Groups/Tanium Roles assignment, this is a finding.

Fix: F-73105r1_fix

Analyze the users configured in the Tanium interface. Determine least privileged access required for each user to perform their respective duties. Move users to the appropriate Active Directory security group in order to ensure the user is synced to the appropriate Tanium User Role. If appropriate Active Directory security groups are not already configured, create the groups and add the appropriate users. Ensure AD sync re-populates the Tanium Users' associated Roles accordingly.

b
Tanium console users User Roles must be validated against the documentation for User Roles.
AC-3 - Medium - CCI-000213 - V-67007 - SV-81497r1_rule
RMF Control
AC-3
Severity
Medium
CCI
CCI-000213
Version
TANS-CN-000007
Vuln IDs
  • V-67007
Rule IDs
  • SV-81497r1_rule
System access should be reviewed periodically to verify that all Tanium users are assigned the appropriate role, with the least privileged access possible to perform assigned tasks being the recommended best practice. Users who have been removed from the documentation should no longer be configured as a Tanium Console User. Consider removing users that have not logged onto the system within a predetermined time frame. When using Active Directory synchronization, as is required by this STIG, User Roles assignments are via the AD Sync connector. AD security groups correlate, one to one, to Tanium User Roles. To change a Tanium user's User Role, their Active Directory account needs to be moved to the AD security group which correlates with the applicable User Role.
Checks: C-67643r1_chk

Using a web browser on a system that has connectivity to the Tanium Server, access the Tanium Server web user interface (UI) and log on with CAC. Click on "Administration". Select the "Users" tab. Verify each user against the provided list, and review the assigned roles for each user against the "User Role" column. If any user exists in Tanium but is not on the documented list and/or if any user exists in Tanium at a more elevated User Role than that documented on the list, this is a finding.

Fix: F-73107r1_fix

When using Active Directory synchronization, as is required by this STIG, User Roles assignments are via the AD Sync connector. AD security groups correlate, one to one, to Tanium User Roles. To change a Tanium user's User Role, their Active Directory account needs to be moved to the AD security group which correlates with the applicable User Role. Access the Active Directory server. Locate the account(s) which have been determined to have the incorrect User Roles in Tanium. Review the Tanium-related AD Security Groups to which the user account(s) belong which directly correlate to the incorrect Tanium User Roles. Remove the user account(s) from the incorrect Tanium User Roles, ensuring the user account(s) are still members of the Tanium-related AD Security Groups for which they have been documented to be authorized.

b
Documentation identifying Tanium console users and their respective Computer Groups rights must be maintained.
AC-3 - Medium - CCI-000213 - V-67009 - SV-81499r1_rule
RMF Control
AC-3
Severity
Medium
CCI
CCI-000213
Version
TANS-CN-000008
Vuln IDs
  • V-67009
Rule IDs
  • SV-81499r1_rule
System access should be reviewed periodically to verify that all Tanium users are assigned the appropriate role, with the least privileged access possible to perform assigned tasks being the recommended best practice. Users who have been removed from the documentation should no longer be configured as a Tanium Console User. Consider removing users that have not logged onto the system within a predetermined time frame.
Checks: C-67645r1_chk

Consult with the Tanium System Administrator to review the documented list of Tanium users and their respective, approved Computer Groups rights. If the site does not have the Tanium users and their respective, approved Computer Groups rights documented, this is a finding.

Fix: F-73109r1_fix

Prepare and maintain documentation identifying the Tanium console users and their respective Computer Groups rights.

b
Tanium console users Computer Group rights must be validated against the documentation for Computer Group rights.
AC-3 - Medium - CCI-000213 - V-67011 - SV-81501r1_rule
RMF Control
AC-3
Severity
Medium
CCI
CCI-000213
Version
TANS-CN-000009
Vuln IDs
  • V-67011
Rule IDs
  • SV-81501r1_rule
System access should be reviewed periodically to verify that all Tanium users are assigned the appropriate role, with the least privileged access possible to perform assigned tasks being the recommended best practice. Users who have been removed from the documentation should no longer be configured as a Tanium Console User. Consider removing users that have not logged onto the system within a predetermined time frame.
Checks: C-67647r1_chk

Using a web browser on a system that has connectivity to the Tanium Server, access the Tanium Server web user interface (UI) and log on with CAC. Click on "Administration". Select the "Users" tab. Verify each user against the provided list, and review the assigned group rights for each user against the "Group Rights" column. If any user exists in Tanium but is not on the documented list and/or if any user exists in Tanium with more Group Rights than documented on the list, this is a finding.

Fix: F-73111r1_fix

Using a web browser on a system that has connectivity to the Tanium Server, access the Tanium Server web user interface (UI) and log on with CAC. Click on "Administration". Select the "Users" tab. For any user(s) in Tanium which is not on the approved, documented list, access the Microsoft Windows Active Directory Management and remove the respective user(s) from the AD Security Group in which those user(s) are members. For any user in Tanium which has not been assigned one or more Computer Groups as has been documented in the Computer Groups list, access the Microsoft Windows Active Directory Management and add the respective user(s) to the AD Security Groups applicable for the roles for which the user(s) have been documented to be authorized. Click “Save”.

c
Common Access Card (CAC)-based authentication must be enabled on the Tanium Server for network access with privileged accounts.
AC-11 - High - CCI-000056 - V-67013 - SV-81503r2_rule
RMF Control
AC-11
Severity
High
CCI
CCI-000056
Version
TANS-CN-000010
Vuln IDs
  • V-67013
Rule IDs
  • SV-81503r2_rule
To assure accountability and prevent unauthenticated access, organizational users must be identified and authenticated to prevent potential misuse and compromise of the system. Organizational users include organizational employees or individuals the organization deems to have equivalent status of employees (e.g., contractors). Organizational users (and any processes acting on behalf of users) must be uniquely identified and authenticated for all accesses, except the following. (i) Accesses explicitly identified and documented by the organization. Organizations document specific user actions that can be performed on the information system without identification or authentication; and (ii) Accesses that occur through authorized use of group authenticators without individual authentication. Organizations may require unique identification of individuals in group accounts (e.g., shared privilege accounts) or for detailed accountability of individual activity. This not only meets a common requirement in the Federal space but adds a critical layer of security to the user authentication process.
Checks: C-67649r2_chk

Access the Tanium server interactively and logon as an Administrator. Run regedit as Administrator. Navigate to HKLM\Software\Wow6432Node\Tanium\Tanium Server. Validate the value for REG_DWORD "ForceSOAPSSLClientCert" is set to "1". Navigate to HKLM\Software\Wow6432Node\Tanium\Tanium Server Validate the following keys exist and are configured: REG_SZ "ClientCertificateAuthField" For example: X509v3 Subject Alternative Name. REG_SZ "ClientCertificateAuthRegex" For example-DoD: .*\:\s*([^@]+)@.*$ Note: This regedit should be valid for any Subject Alternative Name entry. REG_SZ "ClientCertificateAuth" Note: This registry value defines which certificate file to use for authentication. For example: C:\Program Files\Tanium\Tanium Server\dod.pem REG_SZ "cac_ldap_server_url" Note: This registry value requires that Tanium validate every CAC/PIV authentication attempt with AD to determine the state of the account that’s logging in. It must use the syntax of LDAP://&lt;AD instance FQDN&gt; If the value for REG_DWORD "ForceSOAPSSLClientCert" is not set to "1" and the remaining registry values are not configured, this is a finding.

Fix: F-73113r1_fix

Use the vendor documentation titled "Enabling SmartCard Authentication in Tanium 6.5+" to implement correct configuration settings for this requirement. Vendor documentation can be downloaded from the following URL: https://kb.tanium.com/Smart_Card_Authentication.

b
Common Access Card (CAC)-based authentication must be enabled on the Tanium Server for network access with non-privileged accounts.
IA-2 - Medium - CCI-000766 - V-67015 - SV-81505r2_rule
RMF Control
IA-2
Severity
Medium
CCI
CCI-000766
Version
TANS-CN-000011
Vuln IDs
  • V-67015
Rule IDs
  • SV-81505r2_rule
To assure accountability and prevent unauthenticated access, non-privileged users must utilize multifactor authentication to prevent potential misuse and compromise of the system. Multifactor authentication uses two or more factors to achieve authentication. Factors include: (i) Something you know (e.g., password/PIN); (ii) Something you have (e.g., cryptographic identification device, token); or (iii) Something you are (e.g., biometric). A non-privileged account is any information system account with authorizations of a non-privileged user. Network access is any access to an application by a user (or process acting on behalf of a user) where said access is obtained through a network connection. Applications integrating with the DoD Active Directory and utilize the DoD CAC are examples of compliant multifactor authentication solutions.
Checks: C-67651r2_chk

Access the Tanium server interactively and log on as an Administrator. Run regedit as Administrator. Navigate to HKLM\Software\Wow6432Node\Tanium\Tanium Server. Validate the value for REG_DWORD "ForceSOAPSSLClientCert" is set to "1". Navigate to HKLM\Software\Wow6432Node\Tanium\Tanium Server Validate the following keys exist and are configured: REG_SZ "ClientCertificateAuthField" For example: X509v3 Subject Alternative Name. REG_SZ "ClientCertificateAuthRegex" For example-DoD: .*\:\s*([^@]+)@.*$ Note: This regex should be valid for any Subject Alternative Name entry. REG_SZ "ClientCertificateAuth" Note: This registry value defines which certificate file to use for authentication. For example: C:\Program Files\Tanium\Tanium Server\dod.pem REG_SZ "cac_ldap_server_url" Note: This registry value requires that Tanium validate every CAC/PIV authentication attempt with AD to determine the state of the account that’s logging in. It must use the syntax of LDAP://&lt;AD instance FQDN&gt; If the value for REG_DWORD "ForceSOAPSSLClientCert" is not set to "1" and the remaining registry values are not configured, this is a finding.

Fix: F-73115r1_fix

Use the vendor documentation titled "Enabling SmartCard Authentication in Tanium 6.5+" to implement correct configuration settings for this requirement. Vendor documentation can be downloaded from the following URL: https://kb.tanium.com/Smart_Card_Authentication.

c
Common Access Card (CAC)-based authentication must be enforced on the Tanium Server for authentication for local access with privileged accounts.
IA-2 - High - CCI-000767 - V-67017 - SV-81507r2_rule
RMF Control
IA-2
Severity
High
CCI
CCI-000767
Version
TANS-CN-000012
Vuln IDs
  • V-67017
Rule IDs
  • SV-81507r2_rule
To assure accountability and prevent unauthenticated access, organizational users must be identified and authenticated to prevent potential misuse and compromise of the system. Organizational users include organizational employees or individuals the organization deems to have equivalent status of employees (e.g., contractors). Organizational users (and any processes acting on behalf of users) must be uniquely identified and authenticated for all accesses, except the following. (i) Accesses explicitly identified and documented by the organization. Organizations document specific user actions that can be performed on the information system without identification or authentication; and (ii) Accesses that occur through authorized use of group authenticators without individual authentication. Organizations may require unique identification of individuals in group accounts (e.g., shared privilege accounts) or for detailed accountability of individual activity. This not only meets a common requirement in the Federal space but adds a critical layer of security to the user authentication process. 
Checks: C-67653r2_chk

Access the Tanium server interactively and log on as an Administrator. Run regedit as Administrator. Navigate to HKLM\Software\Wow6432Node\Tanium\Tanium Server. Validate the value for REG_DWORD "ForceSOAPSSLClientCert" is set to "1". Navigate to HKLM\Software\Wow6432Node\Tanium\Tanium Server Validate the following keys exist and are configured: REG_SZ "ClientCertificateAuthField" For example: X509v3 Subject Alternative Name. REG_SZ "ClientCertificateAuthRegex" For example-DoD: .*\:\s*([^@]+)@.*$ Note: This regex should be valid for any Subject Alternative Name entry. REG_SZ "ClientCertificateAuth" Note: This registry value defines which certificate file to use for authentication. For example: C:\Program Files\Tanium\Tanium Server\dod.pem REG_SZ "cac_ldap_server_url" Note: This registry value requires that Tanium validate every CAC/PIV authentication attempt with AD to determine the state of the account that’s logging in. It must use the syntax of LDAP://&lt;AD instance FQDN&gt; If the value for REG_DWORD "ForceSOAPSSLClientCert" is not set to "1" and the remaining registry values are not configured, this is a finding.

Fix: F-73117r1_fix

Use the vendor documentation titled "Enabling SmartCard Authentication in Tanium 6.5+" to implement correct configuration settings for this requirement. Vendor documentation can be downloaded from the following URL: https://kb.tanium.com/Smart_Card_Authentication.

b
Common Access Card (CAC)-based authentication must be enforced on the Tanium Server for authentication for local access with non-privileged accounts.
IA-2 - Medium - CCI-000768 - V-67019 - SV-81509r1_rule
RMF Control
IA-2
Severity
Medium
CCI
CCI-000768
Version
TANS-CN-000013
Vuln IDs
  • V-67019
Rule IDs
  • SV-81509r1_rule
To assure accountability and prevent unauthenticated access, privileged users must utilize multifactor authentication to prevent potential misuse and compromise of the system. Multifactor authentication is defined as: using two or more factors to achieve authentication. Factors include: (i) Something a user knows (e.g., password/PIN); (ii) Something a user has (e.g., cryptographic identification device, token); or (iii) Something a user is (e.g., biometric). A privileged account is defined as an information system account with authorizations of a privileged user. Local access is defined as access to an organizational information system by a user (or process acting on behalf of a user) communicating through a direct connection without the use of a network. Applications integrating with the DoD Active Directory and utilize the DoD CAC are examples of compliant multifactor authentication solutions.
Checks: C-67655r1_chk

Access the Tanium Module server interactively and log on as an Administrator. Run regedit as Administrator. Navigate to HKLM\Software\Wow6432Node\Tanium\Tanium Server. Validate the value for REG_DWORD "ForceSOAPSSLClientCert" is set to "1". Navigate to HKLM\Software\Wow6432Node\Tanium\Tanium Server Validate the following keys exist and are configured: REG_SZ "ClientCertificateAuthField" For example: X509v3 Subject Alternative Name. REG_SZ "ClientCertificateAuthRegex" For example-DoD: .*\:\s*([^@]+)@.*$ Note: This regex should be valid for any Subject Alternative Name entry. REG_SZ "ClientCertificateAuth" Note: This registry value defines which certificate file to use for authentication. For example: C:\Program Files\Tanium\Tanium Server\dod.pem REG_SZ "cac_ldap_server_url" Note: This registry value requires that Tanium validate every CAC/PIV authentication attempt with AD to determine the state of the account that’s logging on. It must use the syntax of LDAP://&lt;AD instance FQDN&gt; If the value for REG_DWORD "ForceSOAPSSLClientCert" is not set to "1" and the remaining registry values are not configured, this is a finding.

Fix: F-73119r1_fix

Use the vendor documentation titled "Enabling SmartCard Authentication in Tanium 6.5+" to implement correct configuration settings for this requirement. Vendor documentation can be downloaded from the following URL: https://kb.tanium.com/Smart_Card_Authentication.

b
Firewall rules must be configured on the Tanium Server for Console-to-Server communications.
CM-7 - Medium - CCI-001762 - V-67021 - SV-81511r1_rule
RMF Control
CM-7
Severity
Medium
CCI
CCI-001762
Version
TANS-CN-000014
Vuln IDs
  • V-67021
Rule IDs
  • SV-81511r1_rule
An HTML5/Adobe Flash based application, the Tanium Console runs from any device with a browser configured with Adobe Flash Player 11.5 or higher. For security, the TCP and SOAP communication to the Tanium Server is SSL encrypted, so the Tanium Server installer configures the server to listen for TCP and SOAP requests on port 443. If another installed application is listening on port 443, you can designate a different port for TCP and SOAP communication when installing the Tanium Server. Port Needed: To Tanium Server over TCP ports 443, 17440, and 17441 Network firewall rules: Allow TCP traffic on port 443 from any computer on the internal network to the Tanium Server device Allow TCP traffic on port 17440 from any computer on the internal network to the Tanium Server device (Patch Workbench) https://kb.tanium.com/Port_Configuration_v6.5
Checks: C-67657r1_chk

Consult with the Tanium System Administrator to verify which firewall is being used as a host-based firewall on the Tanium Server. Access the host-based firewall configuration on the Tanium Server. Validate a rule exists for the following: Port Needed: From only designated Tanium console user clients to Tanium Server over TCP ports 443, 17440, and 17441. If a host-based firewall rule does not exist to allow only designated Tanium console user clients to Tanium Server over TCP ports 443, 17440, and 17441, this is a finding. Consult with the network firewall administrator and validate rules exist for the following: Allow TCP traffic from only designated Tanium console user clients to Tanium Server over TCP ports 443, 17440, and 17441. If a network firewall rule does not exist to allow traffic from only designated Tanium console user clients to Tanium Server over TCP ports 443, 17440, and 17441, this is a finding.

Fix: F-73121r1_fix

Configure host-based and network firewall rules as required.

b
The Tanium SQL database must be installed on a separate system.
AC-23 - Medium - CCI-002346 - V-67023 - SV-81513r1_rule
RMF Control
AC-23
Severity
Medium
CCI
CCI-002346
Version
TANS-DB-000001
Vuln IDs
  • V-67023
Rule IDs
  • SV-81513r1_rule
Failure to protect organizational information from data mining may result in a compromise of information. Data storage objects include, for example, databases, database records, and database fields. Data mining prevention and detection techniques include, for example: limiting the types of responses provided to database queries; limiting the number/frequency of database queries to increase the work factor needed to determine the contents of such databases; and notifying organizational personnel when atypical database queries or accesses occur.
Checks: C-67659r1_chk

Consult with the Tanium System Administrator to determine the server to which the SQL database has been installed and is configured. If the SQL database is installed on the same server as the Tanium Server, this is a finding.

Fix: F-73123r1_fix

Move the Tanium SQL database from the Tanium Server to a separate SQL server system.

b
The Tanium SQL server must be dedicated to the Tanium application database.
AC-23 - Medium - CCI-002346 - V-67025 - SV-81515r1_rule
RMF Control
AC-23
Severity
Medium
CCI
CCI-002346
Version
TANS-DB-000002
Vuln IDs
  • V-67025
Rule IDs
  • SV-81515r1_rule
Failure to protect organizational information from data mining may result in a compromise of information. Data storage objects include, for example, databases, database records, and database fields. Data mining prevention and detection techniques include, for example: limiting the types of responses provided to database queries; limiting the number/frequency of database queries to increase the work factor needed to determine the contents of such databases; and notifying organizational personnel when atypical database queries or accesses occur.
Checks: C-67661r1_chk

With the Tanium administrator's assistance, access the server on which the Tanium SQL database is installed. Review the databases hosted by that SQL server. If more databases exist on the SQL server than the Tanium database, this is a finding.

Fix: F-73125r1_fix

Move the Tanium SQL database from the SQL server hosting multiple databases to a dedicated SQL server or remove other databases co-located with Tanium on the existing SQL server.

b
The access to the Tanium SQL database must be restricted. Only the designated database administrator(s) can have elevated privileges to the Tanium SQL database.
CM-5 - Medium - CCI-001814 - V-67027 - SV-81517r1_rule
RMF Control
CM-5
Severity
Medium
CCI
CCI-001814
Version
TANS-DB-000003
Vuln IDs
  • V-67027
Rule IDs
  • SV-81517r1_rule
After the Tanium Server has been installed and the Tanium databases created, only the Tanium Receiver, Tanium Module, and Tanium connection manager (ad sync) service needs to access the SQL Server database.
Checks: C-67663r1_chk

Access the Tanium SQL server interactively. Log on with an account with administrative privileges to the server. Open SQL Server Management Studio and connect to a Tanium instance of SQL Server. In the left pane, click “Databases”, select the Tanium database, click “Security”, and then click “Users”. In the “Users” pane, review the roles assigned to the user accounts. If any user account has an elevated privilege role other than the assigned database administrator, this is a finding.

Fix: F-73127r1_fix

Access the Tanium SQL server interactively. Log on with an account with administrative privileges to the server. Open SQL Server Management Studio and connect to a Tanium instance of SQL Server. In the left pane, click “Databases”, select the Tanium database, click “Security”, and then click “Users”. In the “Users” pane, review the roles assigned to the user accounts. For any user accounts with elevated privileges, reduce the role assigned to a least privileged role.

b
The Tanium Server installers account SQL database permissions must be reduced from sysadmin to db_owner.
CM-5 - Medium - CCI-001814 - V-67029 - SV-81519r1_rule
RMF Control
CM-5
Severity
Medium
CCI
CCI-001814
Version
TANS-DB-000004
Vuln IDs
  • V-67029
Rule IDs
  • SV-81519r1_rule
Creating the tanium and tanium_archive databases through the Tanium Server installer program or using the database create SQL scripts requires Sysadmin-level permissions. Once the databases have been created, the Tanium Server service must be configured to execute under an account that holds at least the dbo role on both databases. Post-installation, if the account used to configure the Tanium Server services to access the remote SQL database server holds only the Database Owner role, rather than the sysadmin role, consider granting this account the View Server State permission on the SQL Server. While it's not strictly necessary, this dynamic management view enables the Tanium Server to access data faster than the dbo role alone.
Checks: C-67665r2_chk

Access the Tanium SQL server interactively. Log on with an account with administrative privileges to the server. Open SQL Server Management Studio and connect to Tanium instance of SQL Server. In the left pane, click “Databases”, select the Tanium database, click “Security”, and then click “Users”. In the “Users” pane, review the role assign to the Tanium Server installer's user account. If the role assigned to the Tanium Server installer's account is not db_owner, this is a finding.

Fix: F-73129r2_fix

Access the Tanium SQL server interactively. Log on with an account with administrative privileges to the server. Open SQL Server Management Studio and connect to Tanium instance of SQL Server. In the left pane, click “Databases”, select the Tanium database, click “Security”, and then click “Users”. In the “Users” pane, right-click the Tanium Server installer's user account, and on the shortcut menu, click “Properties”. Under Database role membership, change role from sysadmin to db_owner. Click “OK”.

b
Firewall rules must be configured on the Tanium Server for Server-to-Database communications.
CM-7 - Medium - CCI-001762 - V-67031 - SV-81521r1_rule
RMF Control
CM-7
Severity
Medium
CCI
CCI-001762
Version
TANS-DB-000005
Vuln IDs
  • V-67031
Rule IDs
  • SV-81521r1_rule
The Tanium Server can use either a SQL Server RDBMS installed locally to the same device as the Tanium Server application or a remote dedicated or shared SQL Server instance. Using a local SQL Server database typically requires no changes to network firewall rules since all communication remains on the Tanium application server device. To access database resources installed to a remote device, however, the Tanium Server service communicates over the port reserved for SQL, by default port 1433, to the database. Port Needed: Tanium Server to Remote SQL Server over TCP port 1433. Network firewall rules: Allow TCP traffic on port 1433 from the Tanium Server device to the remote device hosting the SQL Server RDBMS. https://kb.tanium.com/Port_Configuration_v6.5
Checks: C-67667r1_chk

Consult with the Tanium System Administrator to verify which firewall is being used as a host-based firewall on the Tanium Server. Access the host-based firewall configuration on the Tanium Server. Validate a rule exists for the following: Port Needed: Tanium Server to Remote SQL Server over TCP port 1433. If a host-based firewall rule does not exist to allow Tanium Server to Remote SQL Server over TCP port 1433, this is a finding. Consult with the network firewall administrator and validate rules exist for the following: Allow traffic from Tanium Server to Remote SQL Server over TCP port 1433. If a network firewall rule does not exist to allow traffic from Tanium Server to Remote SQL Server over TCP port 1433, this is a finding.

Fix: F-73131r1_fix

Configure host-based and network firewall rules as required.

b
SQL stored queries or procedures installed during Tanium installation must be removed from the Tanium Server.
SI-2 - Medium - CCI-002617 - V-67033 - SV-81523r1_rule
RMF Control
SI-2
Severity
Medium
CCI
CCI-002617
Version
TANS-DB-000006
Vuln IDs
  • V-67033
Rule IDs
  • SV-81523r1_rule
Failure to protect organizational information from data mining may result in a compromise of information. Data storage objects include, for example, databases, database records, and database fields. Data mining prevention and detection techniques include, for example: limiting the types of responses provided to database queries; limiting the number/frequency of database queries to increase the work factor needed to determine the contents of such databases; and notifying organizational personnel when atypical database queries or accesses occur.
Checks: C-67669r1_chk

Access the Tanium Server interactively. Log on with an account with administrative privileges to the server. Review the folder to which the Tanium installation package was downloaded and, if different, the folder from which the Tanium installation was run. If any SQL stored queries or procedures are found in the folder to which the Tanium installation package was downloaded and, if different, the folder from which the Tanium installation was run, this is a finding.

Fix: F-73133r1_fix

Access the Tanium Server interactively. Log on with an account with administrative privileges to the server. Locate and remove the SQL queries or procedures from the folder to which the Tanium installation package was downloaded and, if different, the folder from which the Tanium installation was run.

b
The Tanium Application Server must protect the confidentiality and integrity of transmitted information.
SC-8 - Medium - CCI-002418 - V-67035 - SV-81525r1_rule
RMF Control
SC-8
Severity
Medium
CCI
CCI-002418
Version
TANS-SV-000001
Vuln IDs
  • V-67035
Rule IDs
  • SV-81525r1_rule
Without protection of the transmitted information, confidentiality and integrity may be compromised since unprotected communications can be intercepted and either read or altered. This requirement applies only to those applications that are either distributed or can allow access to data non-locally. Use of this requirement will be limited to situations where the data owner has a strict requirement for ensuring data integrity and confidentiality is maintained at every step of the data transfer and handling process. When transmitting data, applications need to leverage transmission protection mechanisms, such as TLS, SSL VPNs, or IPSEC. Communication paths outside the physical protection of a controlled boundary are exposed to the possibility of interception and modification. Protecting the confidentiality and integrity of organizational information can be accomplished by physical means (e.g., employing physical distribution systems) or by logical means (e.g., employing cryptographic techniques). If physical means of protection are employed, then logical means (cryptography) do not have to be employed, and vice versa.
Checks: C-67671r1_chk

Using a web browser on a system that has connectivity to the Tanium Server, access the Tanium Server web user interface (UI) and log on with CAC. Click on "Administration". Select the "Global Settings" tab. In the search box beside "Show Settings Containing:" type "sign_all_questions_flag". Enter. If no results are returned, this is a finding since this setting needs to be explicitly set. If results are returned for sign_all_questions_flag but the value is not "1", this is a finding.

Fix: F-73135r1_fix

Using a web browser on a system that has connectivity to the Tanium Server, access the Tanium Server web user interface (UI) and log on with CAC. Click on "Administration". Select the "Global Settings" tab. Click on "+ Add New Setting". In "Create New Setting" dialog box, enter "sign_all_questions_flag" for "Setting Name:". Enter "1" for "Setting Value:". Select "Numeric" from "Value Type" drop-down list. Select "Server" from "Affects" drop-down list. Click “Save”.

b
The Tanium Application Server console must be configured to initiate a session lock after a 15-minute period of inactivity.
AC-11 - Medium - CCI-000057 - V-67037 - SV-81527r1_rule
RMF Control
AC-11
Severity
Medium
CCI
CCI-000057
Version
TANS-SV-000002
Vuln IDs
  • V-67037
Rule IDs
  • SV-81527r1_rule
The Tanium Console, when CAC is enabled, will initiate a session lock based upon the ActivClient or other Smart Card software. By initiating the session lock, the console will be locked and not allow unauthorized access by anyone other than the original user. Although this setting does not apply when CAC is enabled, it should be explicitly disabled in the event CAC authentication is ever broken or removed.
Checks: C-67673r1_chk

Using a web browser on a system that has connectivity to the Tanium Server, access the Tanium Server web user interface (UI) and log on with CAC. After logging in, click on "Preferences" in the top right corner of the UI. Verify the "Suspend console automatically if no activity detected for:" is configured to a value of "15" minutes or less. If the "Suspend console automatically if no activity detected for:" is not configured to a value of "15" minutes or less, this is a finding.

Fix: F-73137r1_fix

Using a web browser on a system that has connectivity to the Tanium Server, access the Tanium Server web user interface (UI) and log on with CAC. After logging in, click on "Preferences" in the top right corner of the UI. For "Suspend console automatically if no activity detected for:", select a value of 15 minutes or less. Click the “x” to close the "Preferences" box.

b
Trusted Content providers must be documented.
AC-17 - Medium - CCI-001453 - V-67039 - SV-81529r1_rule
RMF Control
AC-17
Severity
Medium
CCI
CCI-001453
Version
TANS-SV-000003
Vuln IDs
  • V-67039
Rule IDs
  • SV-81529r1_rule
A Tanium Sensor, also called content, enables an organization to gather real-time inventory, configuration, and compliance data elements from managed computers. Sensors gather specific information from the local device and then write the results to the computer's standard output channel. The Tanium Client captures that output and forwards the results through the platform's unique "ring" architecture for display in the Tanium Console. The language used for Sensor development is based on the scripting engine available on the largest number of devices under management as well as the scripting experience and background of the people who will be responsible for creating new Sensors. VBScript and PowerShell are examples of common scripting languages used for developing sensors. Because errors in scripting can and will provide errant feedback at best and will impact functionality of the endpoint to which the content is directed, it is imperative to ensure content is only accepted from trusted sources.
Checks: C-67675r1_chk

Note: If only using Tanium provided content and not accepting content from any other content providers, this is Not Applicable. Consult with the Tanium System Administrator to review the documented list of trusted content providers along with the HASH for their respective public keys. If the site does not have the Tanium trusted content providers documented along with the HASH for their respective public keys, this is a finding.

Fix: F-73139r1_fix

Prepare and maintain documentation identifying the Tanium trusted content providers along with the HASH from their respective public keys.

b
Content providers must provide their public key to the Tanium administrator to import for validating signed content.
AC-17 - Medium - CCI-001453 - V-67041 - SV-81531r1_rule
RMF Control
AC-17
Severity
Medium
CCI
CCI-001453
Version
TANS-SV-000004
Vuln IDs
  • V-67041
Rule IDs
  • SV-81531r1_rule
A Tanium Sensor, also called content, enables an organization to gather real-time inventory, configuration, and compliance data elements from managed computers. Sensors gather specific information from the local device and then write the results to the computer's standard output channel. The Tanium Client captures that output and forwards the results through the platform's unique "ring" architecture for display in the Tanium Console. The language used for Sensor development is based on the scripting engine available on the largest number of devices under management as well as the scripting experience and background of the people who will be responsible for creating new Sensors. VBScript and PowerShell are examples of common scripting languages used for developing sensors. Because errors in scripting can and will provide errant feedback at best and will impact functionality of the endpoint to which the content is directed, it is imperative to ensure content is only accepted from trusted sources.
Checks: C-67677r2_chk

Note: If only using Tanium provided content and not accepting content from any other content providers, this is Not Applicable. Access the Tanium Server interactively. Log on with an account with administrative privileges to the server. Open an Explorer window. Navigate to the \Program Files\Tanium\Tanium Server\content_public_keys\content folder. If the Tanium default content-release.pub key is the only key in the folder, and there are content providers other than Tanium, this is a finding.

Fix: F-73141r2_fix

Obtain .XML content from trusted provider, including their public key. If trusted provider can't provide their signed content along with their public key, remove their respective content from the Tanium Server and from the trusted provider list until it can be provided. Access the Tanium Server interactively. Log on with an account with administrative privileges to the server. Open an Explorer window. Navigate to the \Program Files\Tanium\Tanium Server\content_public_keys\content folder. Copy Trusted Source's .pub key into the folder. Using a web browser on a system that has connectivity to the Tanium Server, access the Tanium Server web user interface (UI) and logon with CAC. From the console's “Authoring” tab, click the "Import From XML" link in the upper right corner. Browse to the signed xml file and select it. If a “Content Import Review” screen is displayed, verify content being imported is the most recent content from this provider and select “Overwrite database duplicates”.

b
Public keys of content providers must be validated against documented trusted content providers.
AC-17 - Medium - CCI-001453 - V-67043 - SV-81533r1_rule
RMF Control
AC-17
Severity
Medium
CCI
CCI-001453
Version
TANS-SV-000005
Vuln IDs
  • V-67043
Rule IDs
  • SV-81533r1_rule
A Tanium Sensor, also called content, enables an organization to gather real-time inventory, configuration, and compliance data elements from managed computers. Sensors gather specific information from the local device and then write the results to the computer's standard output channel. The Tanium Client captures that output and forwards the results through the platform's unique "ring" architecture for display in the Tanium Console. The language used for Sensor development is based on the scripting engine available on the largest number of devices under management as well as the scripting experience and background of the people who will be responsible for creating new Sensors. VBScript and PowerShell are examples of common scripting languages used for developing sensors. Because errors in scripting can and will provide errant feedback at best and will impact functionality of the endpoint to which the content is directed, it is imperative to ensure content is only accepted from trusted sources.
Checks: C-67679r1_chk

Note: If only using Tanium provided content and not accepting content from any other content providers, this is Not Applicable. Access the Tanium Server interactively. Log on with an account with administrative privileges to the server. Open an Explorer window. Navigate to the \Program Files\Tanium\Tanium Server\content_public_keys\content folder. If a public key, other than the default Tanium public key, resides in the content folder and is not documented on the trusted content provider list, this is a finding.

Fix: F-73143r1_fix

Remove the content from Tanium for which a public key is imported into Tanium and which is not documented as a trusted content provider.

b
The Tanium Action Approval feature must be enabled for two person integrity when deploying actions to endpoints.
AC-3 - Medium - CCI-000213 - V-67045 - SV-81535r1_rule
RMF Control
AC-3
Severity
Medium
CCI
CCI-000213
Version
TANS-SV-000006
Vuln IDs
  • V-67045
Rule IDs
  • SV-81535r1_rule
The Tanium Action Approval feature provides a "four eyes" control mechanism designed to achieve a high level of security and reduce the possibility of error for critical operations. When this feature is enabled, an action configured by one Tanium console user will require a second Tanium console user with a role of Action Approver to approve the Action before it is deployed to targeted computers. While this system slows workflow, the reliability of actions deployed will be greater on the Packaging and Targeting.
Checks: C-67681r1_chk

Using a web browser on a system that has connectivity to the Tanium Server, access the Tanium Server web user interface (UI) and log on with CAC. Click on "Administration". Select the "Global Settings" tab. In the search box beside "Show Settings Containing:" type "require_action_approval". Enter. If no results are returned, this is a finding. If results are returned for "require_action_approval", but the value is not "1", this is a finding.

Fix: F-73145r1_fix

Using a web browser on a system that has connectivity to the Tanium Server, access the Tanium Server web user interface (UI) and log on with CAC. Click on "Administration". Select the "Global Settings" tab. Click on "+ Add New Setting". In "Create New Setting" dialog box, enter "require_action_approval" for "Setting Name:". Enter "1" for "Setting Value:". Select "Numeric" from "Value Type" drop-down list. Select "Server" from "Affects drop-down list. Click “Save”.

b
The Tanium documentation identifying recognized and trusted IOC Detect streams must be maintained.
AC-4 - Medium - CCI-001414 - V-67047 - SV-81537r1_rule
RMF Control
AC-4
Severity
Medium
CCI
CCI-001414
Version
TANS-SV-000007
Vuln IDs
  • V-67047
Rule IDs
  • SV-81537r1_rule
An IOC stream is a series or “stream” of IOCs that are imported from a vendor based on a subscription service. An IOC stream can be downloaded manually or on a scheduled basis. The items in an IOC stream can be separately manipulated after they are imported.
Checks: C-67683r1_chk

Consult with the Tanium System Administrator to review the documented list of IOC trusted stream sources. If the site does not have IOC trusted stream sources documented, this is a finding.

Fix: F-73147r1_fix

Prepare and maintain documentation identifying the Tanium IOC trusted stream sources.

b
The Tanium IOC Detect must be configured to receive IOC streams only from trusted sources.
AC-4 - Medium - CCI-001414 - V-67049 - SV-81539r1_rule
RMF Control
AC-4
Severity
Medium
CCI
CCI-001414
Version
TANS-SV-000008
Vuln IDs
  • V-67049
Rule IDs
  • SV-81539r1_rule
An IOC stream is a series or “stream” of IOCs that are imported from a vendor based on a subscription service or manually downloaded and placed in a folder. IOC Detect can be configured to retrieve the manually pulled IOC content on a regularly scheduled basis. The items in an IOC stream can be separately manipulated after they are imported.
Checks: C-67685r1_chk

Using a web browser on a system that has connectivity to the Tanium Server, access the Tanium Server web user interface (UI) and log on with CAC. Click on "IOC Detect". Along the right column of the interface, click on the icon with the down arrow. Verify all configured IOC Detect Streams are configured to a documented trusted source. If any configured IOC Detect Stream is configured to a stream which has not been documented as trusted, this is a finding.

Fix: F-73149r1_fix

Using a web browser on a system that has connectivity to the Tanium Server, access the Tanium Server web user interface (UI) and log on with CAC. Click on "IOC Detect". Along the right column of the interface, click on the icon with the down arrow. Delete IOC streams which are configured to non-trusted source, or re-configured to point to a trusted source.

b
The LogFileSize on Tanium Servers must be enabled with a value of 104857600 (100MB) or more.
AU-3 - Medium - CCI-001487 - V-67051 - SV-81541r2_rule
RMF Control
AU-3
Severity
Medium
CCI
CCI-001487
Version
TANS-SV-000009
Vuln IDs
  • V-67051
Rule IDs
  • SV-81541r2_rule
Although a full set of usage logs for each Tanium component is, by default, no more than 100 MB, logging is initially disabled to minimize impact to any computers that might be critically low on disk space and must be explicitly enabled. To ensure logs retain enough forensic, the logs must be configured to grow to a large enough size. Specifying at least 10MB for clients, the log file will grow to 10MB before rolling over. Tanium Server's log size should be a minimum of 100MB before rolling over in order to retain enough forensic data for analysis.
Checks: C-67687r2_chk

Access the Tanium App server through interactive logon. Run regedit as Administrator. Navigate to HKLM\Software\Wow6432Node\Tanium\Tanium Server. Validate the value for REG_DWORD "LogFileSizeInBytes" is set to "104857600" or greater. If the value for REG_DWORD "LogFileSizeInBytes" is not set to "104857600" or greater, this is a finding.

Fix: F-73151r2_fix

Access the Tanium App server through interactive logon. Run regedit as Administrator. Navigate to HKLM\Software\Wow6432Node\Tanium\Tanium Server. Set the value for REG_DWORD "LogFileSizeInBytes" to "104857600" or greater.

b
The Tanium IOC Detect module must be configured to forward events.
AU-7 - Medium - CCI-000158 - V-67053 - SV-81543r1_rule
RMF Control
AU-7
Severity
Medium
CCI
CCI-000158
Version
TANS-SV-000010
Vuln IDs
  • V-67053
Rule IDs
  • SV-81543r1_rule
Indicators of Compromise (IOC) is an artifact which is observed on the network or system that indicates computer intrusion. The Tanium IOC Detect module detects, manages, and analyzes systems against IOCs real-time. The module also responds to those detections. By forwarding events the IOC Detect module, using Tanium Connect with a syslog or SIEM connection, captures the necessary forensic evidence supporting a compromise is retained.
Checks: C-67689r1_chk

Using a web browser on a system that has connectivity to the Tanium Server, access the Tanium Server web user interface (UI) and log on with CAC. Click on "IOC Detect". Along the right column of the interface, click on the “gear” icon. The “Workbench Settings” menu will be displayed. Click on the “wrench” icon under "Event Forwarding". If "Forwarding Target" is "Disabled", this is a finding.

Fix: F-73153r1_fix

Using a web browser on a system that has connectivity to the Tanium Server, access the Tanium Server web user interface (UI) and log on with CAC. Click on "IOC Detect". Along the right column of the interface, click on the “gear” icon. The “Workbench Settings” menu will be displayed. Click on the “wrench” icon under "Event Forwarding". Configured the "Event Forwarding" to be configured for "Syslog". If a syslog is already configured under Tanium Connect, the value for "Event Forwarding" may be configured to "Tanium Connect". Click on "Save Changes".

b
Tanium Server files must be protected from antivirus actions.
CM-6 - Medium - CCI-000366 - V-67055 - SV-81545r1_rule
RMF Control
CM-6
Severity
Medium
CCI
CCI-000366
Version
TANS-SV-000040
Vuln IDs
  • V-67055
Rule IDs
  • SV-81545r1_rule
Similar to any other host-based applications, the Tanium Server is subject to the restrictions other System-level software may place on an operating environment. Antivirus, Encryption, or other security and management stack software may disallow the Tanium Server from working as expected. https://kb.tanium.com/Security_Software_Exceptions
Checks: C-67691r1_chk

Consult with the Tanium System Administrator to determine the antivirus software used on the Tanium Server. Review the settings of the antivirus software. Validate exclusions exist which exclude the Tanium program files from being scanned by antivirus. If exclusions do not exist, this is a finding.

Fix: F-73155r1_fix

Implement exclusion policies within the antivirus software solution to exclude the scanning of Tanium program files.

b
The Tanium Application Server console must be configured to display the Standard Mandatory DoD Notice and Consent Banner before granting access to The Tanium Application Server.
AC-8 - Medium - CCI-000048 - V-67057 - SV-81547r1_rule
RMF Control
AC-8
Severity
Medium
CCI
CCI-000048
Version
TANS-SV-000041
Vuln IDs
  • V-67057
Rule IDs
  • SV-81547r1_rule
Display of the DoD-approved use notification before granting access to the application ensures privacy and security notification verbiage used is consistent with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance. System use notifications are required only for access via logon interfaces with human users and are not required when such human interfaces do not exist. The banner must be formatted in accordance with DTM-08-060. Use the following verbiage for applications that can accommodate banners of 1300 characters: "You are accessing a U.S. Government (USG) Information System (IS) that is provided for USG-authorized use only. By using this IS (which includes any device attached to this IS), you consent to the following conditions: -The USG routinely intercepts and monitors communications on this IS for purposes including, but not limited to, penetration testing, COMSEC monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations. -At any time, the USG may inspect and seize data stored on this IS. -Communications using, or data stored on, this IS are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any USG-authorized purpose. -This IS includes security measures (e.g., authentication and access controls) to protect USG interests--not for your personal benefit or privacy. -Notwithstanding the above, using this IS does not constitute consent to PM, LE or CI investigative searching or monitoring of the content of privileged communications, or work product, related to personal representation or services by attorneys, psychotherapists, or clergy, and their assistants. Such communications and work product are private and confidential. See User Agreement for details." Use the following verbiage for operating systems that have severe limitations on the number of characters that can be displayed in the banner: "I've read & consent to terms in IS user agreement."
Checks: C-67693r1_chk

Using a web browser on a system that has connectivity to the Tanium Server, access the Tanium Server web user interface (UI). If a DoD-approved use notification banner does not display prior to logon, this is a finding.

Fix: F-73157r1_fix

Create an .html file composed of the DoD-authorized warning banner verbiage. Name the file “warning_banner.html”. Copy the .html file to the Tanium Server’s http folder. Using a web browser on a system that has connectivity to the Tanium Server, access the Tanium Server web user interface (UI) and log on with CAC. Click on "Administration". Select the "Global Settings" tab. Click on "+ Add New Setting". In "Create New Setting" dialog box enter "console_PreLoginBannerHTML" for "Setting Name:". Enter “warning_banner.html” for “Setting Value:”. Enter Text for “Value Type:”. Enter Server for “Affects:”. Click Save.

b
The Tanium Application Server console must be configured to retain the Standard Mandatory DoD Notice and Consent Banner on the screen until users acknowledge the usage conditions and take explicit actions to log on for further access.
AC-8 - Medium - CCI-000050 - V-67059 - SV-81549r1_rule
RMF Control
AC-8
Severity
Medium
CCI
CCI-000050
Version
TANS-SV-000042
Vuln IDs
  • V-67059
Rule IDs
  • SV-81549r1_rule
The banner must be acknowledged by the user prior to allowing the user access to the application. This provides assurance that the user has seen the message and accepted the conditions for access. If the consent banner is not acknowledged by the user, DoD will not be in compliance with system use notifications required by law. To establish acceptance of the application usage policy, a click-through banner at application logon is required. The application must prevent further activity until the user executes a positive action to manifest agreement by clicking on a box indicating "OK".
Checks: C-67695r1_chk

Using a web browser on a system that has connectivity to the Tanium Server, access the Tanium Server web user interface (UI). If a DoD-approved use notification banner does not display prior to logon, this is a finding.

Fix: F-73159r1_fix

Create an .html file composed of the DoD-authorized warning banner verbiage. Name the file “warning_banner.html”. Copy the .html file to the Tanium Server’s http folder. Using a web browser on a system that has connectivity to the Tanium Server, access the Tanium Server web user interface (UI) and log on with CAC. Click on "Administration". Select the "Global Settings" tab. Click on "+ Add New Setting". In "Create New Setting" dialog box, enter "console_PreLoginBannerHTML" for "Setting Name:". Enter “warning_banner.html” for “Setting Value:”. Enter Text for “Value Type:”. Enter Server for “Affects:”. Click "Save".

b
Tanium Server files must be protected from file encryption actions.
CM-6 - Medium - CCI-000366 - V-67061 - SV-81551r1_rule
RMF Control
CM-6
Severity
Medium
CCI
CCI-000366
Version
TANS-SV-000043
Vuln IDs
  • V-67061
Rule IDs
  • SV-81551r1_rule
Similar to any other host-based applications, the Tanium Server is subject to the restrictions other System-level software may place on an operating environment. Antivirus, Encryption, or other security and management stack software may disallow the Tanium Server from working as expected. https://kb.tanium.com/Security_Software_Exceptions
Checks: C-67697r1_chk

Consult with the Tanium System Administrator to determine the file encryption software used on the Tanium Server. Review the settings for the file encryption software. Validate exclusions exist which exclude the Tanium program files from being encrypted by the file encryption software. If exclusions do not exist, this is a finding.

Fix: F-73161r1_fix

Implement excluding policies within the file encryption software solution to exclude the file level encryption of the Tanium program files.

b
The SSLCipherSuite must be configured to disable weak encryption algorithms on the Tanium Server.
SC-13 - Medium - CCI-002450 - V-67063 - SV-81553r2_rule
RMF Control
SC-13
Severity
Medium
CCI
CCI-002450
Version
TANS-SV-000044
Vuln IDs
  • V-67063
Rule IDs
  • SV-81553r2_rule
Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to protect data. The application must implement cryptographic modules adhering to the higher standards approved by the federal government since this provides assurance they have been tested and validated.
Checks: C-67699r2_chk

Access the Tanium Server interactively. Log on with an account with administrative privileges to the server. Access the server's registry by typing: "regedit". Enter. Navigate to HKLM &gt;&gt; Software &gt;&gt; Wow6432Node &gt;&gt; Tanium &gt;&gt; Tanium Server. Verify the existence of a String "SSLCipherSuite" with a value of: AES256-GCM-SHA384:AES128-GCM-SHA256:AES256-CCM:AES1 28-CCM:AES256-CCM8:AES128-CCM8:AES256-SHA256:AES128-SHA256:DES-CBC3-SHA:!aNULL:!eNULL:!EXPORT:!DES:!RC4:!MD5:!PSK:!aECDH:!EDH-DSS-DES-CBC3-SHA:!EDH-RSA-DES-CBC3-SHA:!KRB5-DES-CBC3-SHA If the String "SSLCipherSuite" does not exist with the appropriate list values, this is a finding.

Fix: F-73163r2_fix

Access the Tanium Server interactively. Log on with an account with administrative privileges to the server. Access the server's registry by typing: regedit <enter> Navigate to HKLM >> Software >> Wow6432Node >> Tanium >> Tanium Server. Add or modify the String "SSLCipherSuite" to have a value of: AES256-GCM-SHA384:AES128-GCM-SHA256:AES256-CCM:AES1 28-CCM:AES256-CCM8:AES128-CCM8:AES256-SHA256:AES128-SHA256:DES-CBC3-SHA:!aNULL:!eNULL:!EXPORT:!DES:!RC4:!MD5:!PSK:!aECDH:!EDH-DSS-DES-CBC3-SHA:!EDH-RSA-DES-CBC3-SHA:!KRB5-DES-CBC3-SHA

b
The Tanium Application Server must protect audit tools from unauthorized access.
AU-9 - Medium - CCI-001493 - V-67065 - SV-81555r1_rule
RMF Control
AU-9
Severity
Medium
CCI
CCI-001493
Version
TANS-SV-000011
Vuln IDs
  • V-67065
Rule IDs
  • SV-81555r1_rule
Protecting audit data also includes identifying and protecting the tools used to view and manipulate log data. Therefore, protecting audit tools is necessary to prevent unauthorized operation on audit data. Applications providing tools to interface with audit data will leverage user permissions and roles identifying the user accessing the tools and the corresponding rights the user enjoys in order to make access decisions regarding the access to audit tools. Audit tools include, but are not limited to, vendor-provided and open source audit tools needed to successfully view and manipulate audit information system activity and records. Audit tools include custom queries and report generators.
Checks: C-67701r1_chk

Consult with the Tanium System Administrator to review the documented list of Tanium users. Review the users' respective approved roles, as well as the correlated Active Directory security group for the User Roles. Validate Active Directory security groups/Tanium roles are documented to assign a least privileged access to the functions of the Tanium Server through the Tanium interface. If the documentation does not reflect a granular, least privileged access approach to the Active Directory Groups/Tanium Roles assignment, this is a finding.

Fix: F-73165r1_fix

Analyze the users configured in the Tanium interface. Determine least privileged access required for each user to perform their respective duties. Move users to the appropriate Active Directory security group in order to ensure the user is synced to the appropriate Tanium User Role. If appropriate Active Directory security groups are not already configured, create the groups and add the appropriate users. Ensure AD sync re-populates the Tanium Users' associated Roles accordingly.

b
The Tanium Application Server must protect audit tools from unauthorized modification.
AU-9 - Medium - CCI-001494 - V-67067 - SV-81557r1_rule
RMF Control
AU-9
Severity
Medium
CCI
CCI-001494
Version
TANS-SV-000012
Vuln IDs
  • V-67067
Rule IDs
  • SV-81557r1_rule
Protecting audit data also includes identifying and protecting the tools used to view and manipulate log data. Therefore, protecting audit tools is necessary to prevent unauthorized operation on audit data. Applications providing tools to interface with audit data will leverage user permissions and roles identifying the user accessing the tools and the corresponding rights the user enjoys in order to make access decisions regarding the modification of audit tools. Audit tools include, but are not limited to, vendor-provided and open source audit tools needed to successfully view and manipulate audit information system activity and records. Audit tools include custom queries and report generators.
Checks: C-67703r1_chk

Consult with the Tanium System Administrator to review the documented list of Tanium users. Review the users' respective approved roles, as well as the correlated Active Directory security group for the User Roles. Validate Active Directory security groups/Tanium roles are documented to assign a least privileged access to the functions of the Tanium Server through the Tanium interface. If the documentation does not reflect a granular, least privileged access approach to the Active Directory Groups/Tanium Roles assignment, this is a finding.

Fix: F-73167r1_fix

Analyze the users configured in the Tanium interface. Determine least privileged access required for each user to perform their respective duties. Move users to the appropriate Active Directory security group in order to ensure the user is synced to the appropriate Tanium User Role. If appropriate Active Directory security groups are not already configured, create the groups and add the appropriate users. Ensure AD sync re-populates the Tanium Users' associated Roles accordingly.

b
The Tanium Application Server must protect audit tools from unauthorized deletion.
AU-9 - Medium - CCI-001495 - V-67069 - SV-81559r1_rule
RMF Control
AU-9
Severity
Medium
CCI
CCI-001495
Version
TANS-SV-000013
Vuln IDs
  • V-67069
Rule IDs
  • SV-81559r1_rule
Protecting audit data also includes identifying and protecting the tools used to view and manipulate log data. Therefore, protecting audit tools is necessary to prevent unauthorized operation on audit data. Applications providing tools to interface with audit data will leverage user permissions and roles identifying the user accessing the tools and the corresponding rights the user enjoys in order to make access decisions regarding the deletion of audit tools. Audit tools include, but are not limited to, vendor-provided and open source audit tools needed to successfully view and manipulate audit information system activity and records. Audit tools include custom queries and report generators.
Checks: C-67705r1_chk

Consult with the Tanium System Administrator to review the documented list of Tanium users. Review the users' respective approved roles, as well as the correlated Active Directory security group for the User Roles. Validate Active Directory security groups/Tanium roles are documented to assign a least privileged access to the functions of the Tanium Server through the Tanium interface. If the documentation does not reflect a granular, least privileged access approach to the Active Directory Groups/Tanium Roles assignment, this is a finding.

Fix: F-73169r1_fix

Analyze the users configured in the Tanium interface. Determine least privileged access required for each user to perform their respective duties. Move users to the appropriate Active Directory security group in order to ensure the user is synced to the appropriate Tanium User Role. If appropriate Active Directory security groups are not already configured, create the groups and add the appropriate users. Ensure AD sync re-populates the Tanium Users' associated Roles accordingly.

b
The Tanium cryptographic signing capabilities must be enabled on the Tanium Server.
CM-5 - Medium - CCI-001749 - V-67071 - SV-81561r1_rule
RMF Control
CM-5
Severity
Medium
CCI
CCI-001749
Version
TANS-SV-000014
Vuln IDs
  • V-67071
Rule IDs
  • SV-81561r1_rule
All of Tanium's signing capabilities should be enabled upon install. Tanium supports the cryptographic signing and verification before execution of all Sensors, Questions, Actions, Sensor Libraries, File Shards, etc. Enabling signing does away with the ability of an attacker to conduct Man in the Middle (MitM) attacks for the purposes of remote code execution and precludes the modification of the aforementioned data elements in transit. Additionally, Tanium supports object level signing for content ingested into the Tanium platform. This allows for the detection and rejection of changes to objects (sensors, actions, etc.) by even a privileged user within Tanium. Tanium has built-in signing capabilities enabled by default when installed. Cryptographic signing and verification of all Sensors, Questions, Actions, Sensor Libraries, File Shards, etc. before execution will be enforced by Tanium. Signing will prevent MitM remote code execution attacks and will protect data element in transit. Tanium also supports object level signing for content within the Tanium platform.
Checks: C-67707r1_chk

Using a web browser on a system that has connectivity to the Tanium Server, access the Tanium Server web user interface (UI) and log on with CAC. Click on "Administration". Select the "Global Settings" tab. In the search box beside "Show Settings Containing:" type "sign_all_questions_flag". Enter. If no results are returned, this is a finding since this setting needs to be explicitly set. If results are returned for “sign_all_questions_flag” but the value is not "1", this is a finding.

Fix: F-73171r1_fix

Using a web browser on a system that has connectivity to the Tanium Server, access the Tanium Server web user interface (UI) and log on with CAC. Click on "Administration". Select the "Global Settings" tab. Click on "+ Add New Setting". In "Create New Setting" dialog box, enter "sign_all_questions_flag" for "Setting Name:". Enter "1" for "Setting Value:". Select "Numeric" from "Value Type" drop-down list. Select "Server" from "Affects" drop-down list. Click “Save”.

b
The Tanium Server must be configured to only allow signed content to be imported.
CM-5 - Medium - CCI-001749 - V-67073 - SV-81563r2_rule
RMF Control
CM-5
Severity
Medium
CCI
CCI-001749
Version
TANS-SV-000015
Vuln IDs
  • V-67073
Rule IDs
  • SV-81563r2_rule
Changes to any software components can have significant effects on the overall security of the application. Verifying software components have been digitally signed using a certificate that is recognized and approved by the organization ensures the software has not been tampered with and that it has been provided by a trusted vendor. Accordingly, patches, service packs, or application components must be signed with a certificate recognized and approved by the organization. Verifying the authenticity of the software prior to installation validates the integrity of the patch or upgrade received from a vendor. This ensures the software has not been tampered with and that it has been provided by a trusted vendor. Self-signed certificates are disallowed by this requirement. The application should not have to verify the software again. This requirement does not mandate DoD certificates for this purpose; however, the certificate used to verify the software must be from an approved CA.
Checks: C-67709r2_chk

NOTE: This requirement only applies to Tanium implementations in production. If implementation being evaluated is in development, this requirement is Not Applicable. Access the Tanium Server through interactive logon as an Administrator. Open an Explorer window. Navigate to C:\Program Files\Tanium\Tanium Server. Find the tanium.license file, right-click on the file and choose to Open with WordPad. When the contents are opened in WordPad, search for "allow unsigned _import". If "allow unsigned_import" is followed by ":true", this is not a finding.

Fix: F-73173r2_fix

Contact the Tanium vendor to obtain correct copy of Tanium license file.

b
All installation files originally downloaded to the Tanium Server must be configured to download to a location other than the Tanium Server directory.
CM-5 - Medium - CCI-001499 - V-67075 - SV-81565r1_rule
RMF Control
CM-5
Severity
Medium
CCI
CCI-001499
Version
TANS-SV-000016
Vuln IDs
  • V-67075
Rule IDs
  • SV-81565r1_rule
Typically, the Tanium Server stores the Package Source Files that it downloads from the Internet and server shares or files uploaded through the Tanium Console in a subdirectory of the server's installation directory called Downloads. To ensure package files are not accessible to non-authorized functions, the files must be re-located to outside of the server's installation directory.
Checks: C-67711r1_chk

Access the Tanium Server interactively. Log on with an account with administrative privileges to the server. Run regedit as Administrator. Navigate to HKLM\Software\Wow6432Node\Tanium\Tanium Server. Validate the DownloadPath REG_SZ value does not point to a location off of the Tanium Server directory. If the DownloadPath REG_SZ value points to a location off of the Tanium Server directory, this is a finding.

Fix: F-73175r1_fix

Access the Tanium Server interactively. Log on with an account with administrative privileges to the server. Configure a directory elsewhere on the server to relocate the installation package files. Run regedit as Administrator. Navigate to HKLM\Software\Wow6432Node\Tanium\Tanium Server. Change the DownloadPath REG_SZ value to point to the location of the relocated installation package files. Move the files from the original directory to the location created for the installation package files.

b
Firewall rules must be configured on the Tanium Server for Client-to-Server communications.
CM-7 - Medium - CCI-000382 - V-67077 - SV-81567r1_rule
RMF Control
CM-7
Severity
Medium
CCI
CCI-000382
Version
TANS-SV-000017
Vuln IDs
  • V-67077
Rule IDs
  • SV-81567r1_rule
In addition to the client-to-server TCP communication that takes place over port 17472, Tanium Clients also communicate to other Tanium-managed computers over port 17472. The Tanium environment can perform hundreds or thousands of times faster than other security or systems management tools because the Tanium Clients communicate in secure, linearly-controlled peer-to-peer rings. Because clients dynamically communicate with other nearby agents based on proximity and latency, rings tend to form automatically to match a customer's topology--endpoints in California will form one ring while endpoints in Germany will form a separate ring. https://kb.tanium.com/Port_Configuration_v6.5
Checks: C-67713r1_chk

Consult with the Tanium System Administrator to verify which firewall is being used as a host-based firewall on the Tanium Server. Access the host-based firewall configuration on the Tanium Server. Validate rules exist, as required, to include: Between Tanium Clients or Zone Clients over TCP port 17472, bi-directionally. If a host-based firewall rule does not exist to allow TCP port 17472, bi-directionally, this is a finding. Consult with the network firewall administrator and validate rules exist for the following: Allow TCP traffic on port 17472 from any computer to be managed on a local area network to any other computer to be managed on the same local area network. If a network firewall rule does not exist to allow TCP port 17472 from any managed computer to any other managed computer on the same local area network, this is a finding.

Fix: F-73177r1_fix

Configure host-based and network firewall rules as required, to include Tanium Clients or Zone Clients over TCP port 17472, bi-directionally and Allow TCP traffic on port 17472 from any computer to be managed on a local area network to any other computer to be managed on the same local area network.

b
Firewall rules must be configured on the Tanium Zone Server for Client-to-Zone Server communications.
CM-7 - Medium - CCI-000382 - V-67079 - SV-81569r1_rule
RMF Control
CM-7
Severity
Medium
CCI
CCI-000382
Version
TANS-SV-000018
Vuln IDs
  • V-67079
Rule IDs
  • SV-81569r1_rule
In customer environments using the Tanium Zone Server, a Tanium Client may be configured to point to a Zone Server instead of a Tanium Server. The communication requirements for these Clients are identical to the Server-to-Client requirements. https://kb.tanium.com/Port_Configuration_v6.5
Checks: C-67715r1_chk

Note: If a zone server is not being used, this is Not Applicable. Consult with the Tanium System Administrator to verify which firewall is being used as a host-based firewall on the Tanium Zone Server. Access the host-based firewall configuration on the Tanium Zone Server. Validate a rule exists for the following: Port Needed: Tanium Clients to Zone Server over TCP port 17472. If a host-based firewall rule does not exist to allow TCP port 17472, bi-directionally, from Tanium Clients to the Tanium Zone Server, this is a finding.

Fix: F-73179r1_fix

Configure host-based firewall rules as required, to include Tanium Clients to Zone Server over TCP port 17472.

b
The Tanium Application Server must be configured to prohibit or restrict the use of organization-defined functions, ports, protocols, and/or services, as defined in the PPSM CAL and vulnerability assessments.
CM-7 - Medium - CCI-000382 - V-67081 - SV-81571r1_rule
RMF Control
CM-7
Severity
Medium
CCI
CCI-000382
Version
TANS-SV-000019
Vuln IDs
  • V-67081
Rule IDs
  • SV-81571r1_rule
In order to prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling (i.e., embedding of data types within data types), organizations must disable or restrict unused or unnecessary physical and logical ports/protocols on information systems. Applications are capable of providing a wide variety of functions and services. Some of the functions and services provided by default may not be necessary to support essential organizational operations. Additionally, it is sometimes convenient to provide multiple services from a single component (e.g., email and web services); however, doing so increases risk over limiting the services provided by any one component. To support the requirements and principles of least functionality, the application must support the organizational requirements providing only essential capabilities and limiting the use of ports, protocols, and/or services to only those required, authorized, and approved to conduct official business or to address authorized quality of life issues.
Checks: C-67717r1_chk

Review the PPSM CAL to ensure the Tanium application has been registered with all of the TCP ports required for functionality to include (but not limited to) TCP 17472, 17477, 17440, 17441, 443 and 1433. If any TCP ports are being utilized on the Tanium Server which have been deemed as restricted by the PPSM CAL, this is a finding.

Fix: F-73181r1_fix

Submit a formal request to have the Tanium communication ports evaluated and added to the PPSM CAL.

b
The Tanium Server certificates must have Extended Key Usage entries for the serverAuth object TLS Web Server Authentication and the clientAuth object TLS Web Client Authentication.
IA-5 - Medium - CCI-000185 - V-67083 - SV-81573r1_rule
RMF Control
IA-5
Severity
Medium
CCI
CCI-000185
Version
TANS-SV-000020
Vuln IDs
  • V-67083
Rule IDs
  • SV-81573r1_rule
Information can be either unintentionally or maliciously disclosed or modified during reception including, for example, during aggregation, at protocol transformation points, and during packing/unpacking. These unauthorized disclosures or modifications compromise the confidentiality or integrity of the information. This requirement applies only to those applications that are either distributed or can allow access to data non-locally. Use of this requirement will be limited to situations where the data owner has a strict requirement for ensuring data integrity and confidentiality is maintained at every step of the data transfer and handling process. When receiving data, applications need to leverage protection mechanisms, such as TLS, SSL VPNs, or IPSEC.
Checks: C-67719r1_chk

Access the Tanium Module server interactively and log on as an Administrator. Navigate to the \Program Files\Tanium\Tanium Server directory. Locate the SOAPServer.crt file and double-click on it to open the certificate. Select the “Details” tab. Scroll down through the details to find and select the “Extended Key Usage” Field. If there is no “Extended Key Usage” field, this is a finding. In the bottom screen, verify "TLS Web Server Authentication" and "TLS Web Client Authentication" are both identified. If "TLS Web Server Authentication" and "TLS Web Client Authentication" are not both identified, this is a finding.

Fix: F-73183r1_fix

Request or regenerate the certificate being used to include both the serverAuth and clientAuth objects.

c
The Tanium Server certificate and private/public keys directory must be protected with appropriate permissions.
IA-5 - High - CCI-000186 - V-67085 - SV-81575r1_rule
RMF Control
IA-5
Severity
High
CCI
CCI-000186
Version
TANS-SV-000021
Vuln IDs
  • V-67085
Rule IDs
  • SV-81575r1_rule
If the private key is discovered, an attacker can use the key to authenticate as an authorized user and gain access to the network infrastructure. The cornerstone of the PKI is the private key used to encrypt or digitally sign information. If the private key is stolen, this will lead to the compromise of the authentication and non-repudiation gained through PKI because the attacker can use the private key to digitally sign documents and pretend to be the authorized user. Both the holders of a digital certificate and the issuing authority must protect the computers, storage devices, or whatever they use to keep the private keys.
Checks: C-67721r1_chk

Access the Tanium Server interactively. Log on with an account with administrative privileges to the server. Open an Explorer window. Navigate to the \Program Files\Tanium\Tanium Server folder. Right-click on the \Certs folder and choose “Properties”. Select the “Security” tab and click on the “Advanced” button. Validate the owner of the directory is the [Tanium service account]. Validate System has Read Only permissions. If the owner of the directory is not the [Tanium service account] and/or System has more privileges than Read Only, this is a finding. Navigate to the \Program Files\Tanium\Tanium Server\Certs folder. Right-click on each of the following files, select “Properties”. Select the “Security” tab and click on the “Advanced” button. Installedcacert.crt Installed-server.crt Installed-server.key SOAPServer.crt SOAPServer.key Validate System and the [Tanium service account] have Read-Only permissions to each of the individual files. If System and the [Tanium service account] have more than Read-Only permissions to any of the individual files, this is a finding. Navigate to the \Program Files\Tanium\Tanium Server\content_public_keys folder. Right-click on each of the following files, select “Properties”. Select the “Security” tab and click on the “Advanced” button. Validate the [Tanium service account] privileges to Read-Only. Validate system privileges to Read-Only Validate System has Read-Only permissions and is applied to child objects. Validate [Tanium service account] has Read-Only permissions and is applied to child objects. If the [Tanium service account] and system permissions to the \content_public_keys folder is greater than Read-Only and/or the Read-Only permissions have not been applied to child objects, this is a finding.

Fix: F-73185r1_fix

Access the Tanium Server interactively. Logon with an account with administrative privileges to the server. Open an Explorer window. Navigate to the \Program Files\Tanium\Tanium Server folder. Right-click on the \Certs folder and choose “Properties”. Select the “Security” tab and click on the “Advanced” button. Change the owner of the directory to the [Tanium service account]. Reduce System to Read-Only permissions. Navigate to the \Program Files\Tanium\Tanium Server\Certs folder. Right-click on each of the following files, select “Properties”. Select the “Security” tab and click on the “Advanced” button. For the following files, reduce System and the [Tanium service account] to Read-Only: Installedcacert.crt Installed-server.crt Installed-server.key SOAPServer.crt SOAPServer.key Navigate to the \Program Files\Tanium\Tanium Server folder. Right-click on the \content_public_keys folder, select “Properties”. Select the “Security” tab and click on the “Advanced” button. Reduce [Tanium service account] privileges to Read-Only. Reduce system privileges to Read-Only. Reduce System to Read-Only permissions. – apply to child objects. Reduce [Tanium service account] to Read-Only permissions. – apply to child objects.

b
Flash must not be installed on the Tanium Server.
SC-18 - Medium - CCI-001170 - V-67087 - SV-81577r1_rule
RMF Control
SC-18
Severity
Medium
CCI
CCI-001170
Version
TANS-SV-000022
Vuln IDs
  • V-67087
Rule IDs
  • SV-81577r1_rule
Adobe Flash Player is freeware software for using content created on the Adobe Flash platform, including viewing multimedia, executing rich Internet applications, and streaming video and audio. Flash Player is a common format for games, animations, and graphical user interfaces (GUIs) embedded in web pages. Flash Player runs SWF files. Flash Player supports vector and raster graphics, 3D graphics, an embedded scripting language called ActionScript, and streaming of video and audio. ActionScript is based on ECMAScript, and supports object-oriented code, and is similar to JavaScript.Adobe Flash Player is a runtime that executes and displays content from a provided SWF file. Although it has no in-built features to modify the SWF file at runtime, it can execute software written in the ActionScript programming language which enables the runtime manipulation of text, data, vector graphics, raster graphics, sound, and video. The player can also access certain connected hardware devices, including web cameras and microphones, after permission for the same has been granted by the user. Throughout the various version of Adobe Flash Player, multiple vulnerabilities have been exposed requiring patching to mitigate and because of these vulnerabilities it continues to be a target for exploitation. Since Tanium does not require Adobe Flash Player for any functionality, ensuring it is not installed removes the vulnerability.
Checks: C-67723r1_chk

Access the Tanium Server interactively. Log on with an account with administrative privileges to the server. Access Settings &gt;&gt; Control Panel &gt;&gt; Programs &gt;&gt; Programs and Features. Review the installed programs. If Adobe Flash Player is installed, this is a finding.

Fix: F-73187r1_fix

Access the Tanium Server interactively. Log on with an account with administrative privileges to the server. Access Settings >> Control Panel >> Programs >> Programs and Features. Click on the Adobe Flash Player to select it. Select “Uninstall”.

b
The Tanium Module server must be installed on a separate system.
SC-2 - Medium - CCI-001082 - V-67089 - SV-81579r1_rule
RMF Control
SC-2
Severity
Medium
CCI
CCI-001082
Version
TANS-SV-000023
Vuln IDs
  • V-67089
Rule IDs
  • SV-81579r1_rule
Unauthorized access to the Tanium Server is protected by disabling the Module Server service on the Tanium Server and by configuring the Module Server on a separate system. When X509 smartcard certificates (CAC or PIV tokens) are used for access to the Tanium Server, the Tanium Module server must be on a separate system. In order to restrict access to the Tanium Server resulting from an attack on the Module Server, it is recommended that the Tanium Module Server be installed on a separate system or VM from the Tanium Server. Adding to this recommendation, if the Tanium Server is configured to accept X509 Smartcard certificates (also referred to as CAC or PIV tokens) in lieu of username/password logon, the requirement becomes explicit and the Tanium Module Server must be installed on a separate system or VM.
Checks: C-67725r1_chk

Note: If the server being validated is the Module server, this check is Not Applicable. Access the Tanium Server interactively. Log on with an account with administrative privileges to the server. Click “Start” and access Server Manager. Select Local Server. Click "Tools". Select "Services". If the Tanium Module Server service is "Running", this is a finding.

Fix: F-73189r1_fix

Access the Tanium Server interactively. Log on with an account with administrative privileges to the server. Click “Start” and access Server Manager. Select Local Server. Click "Tools" Select "Services". Disable the Tanium Module Server service.

b
The permissions on the Tanium Server directory must be restricted to only the Tanium service account.
AC-3 - Medium - CCI-002165 - V-67091 - SV-81581r1_rule
RMF Control
AC-3
Severity
Medium
CCI
CCI-002165
Version
TANS-SV-000024
Vuln IDs
  • V-67091
Rule IDs
  • SV-81581r1_rule
Discretionary Access Control (DAC) is based on the notion that individual users are "owners" of objects and therefore have discretion over who should be authorized to access the object and in which mode (e.g., read or write). Ownership is usually acquired as a consequence of creating the object or via specified ownership assignment. DAC allows the owner to determine who will have access to objects they control. An example of DAC includes user controlled file permissions. When discretionary access control policies are implemented, subjects are not constrained with regard to what actions they can take with information for which they have already been granted access. Thus, subjects that have been granted access to information are not prevented from passing (i.e., the subjects have the discretion to pass) the information to other subjects or objects. A subject that is constrained in its operation by Mandatory Access Control policies is still able to operate under the less rigorous constraints of this requirement. Thus, while Mandatory Access Control imposes constraints preventing a subject from passing information to another subject operating at a different sensitivity level, this requirement permits the subject to pass the information to any subject at the same sensitivity level. The policy is bounded by the information system boundary. Once the information is passed outside of the control of the information system, additional means may be required to ensure the constraints remain in effect. While the older, more traditional definitions of discretionary access control require identity-based access control, that limitation is not required for this use of discretionary access control.
Checks: C-67727r1_chk

Access the Tanium Server interactively. Log on with an account with administrative privileges to the server. Open an Explorer window. Navigate to the C:\Program Files\Tanium folder. Right-click on the Tanium Server folder, select “Properties”. Select the “Security” tab, click on the “Advanced” button. Validate the owner of the Tanium Server folder is the service account [Tanium service account]. Validate the [Tanium service account] is the only account with full permissions to the Tanium Server folder. Validate Users have no permissions to the Tanium Server folder. If any account other than the [Tanium service account] has any full permission to the Tanium Server folder and/or the [Tanium service account] is not the owner of the Tanium Server folder, this is a finding.

Fix: F-73191r1_fix

Access the Tanium Server interactively. Log on with an account with administrative privileges to the server. Open an Explorer window. Navigate to the C:\Program Files\Tanium folder. Right-click on the Tanium Server folder, select "Properties". Select the “Security” tab, click on the “Advanced” button. Disable folder inheritance. Change the owner of the directory to the service account [Tanium service account]. Remove User permissions. Give [Tanium service account] full permissions.

b
The Tanium Server http directory and sub-directories must be restricted with appropriate permissions.
AC-3 - Medium - CCI-002165 - V-67093 - SV-81583r1_rule
RMF Control
AC-3
Severity
Medium
CCI
CCI-002165
Version
TANS-SV-000025
Vuln IDs
  • V-67093
Rule IDs
  • SV-81583r1_rule
Discretionary Access Control (DAC) is based on the notion that individual users are "owners" of objects and therefore have discretion over who should be authorized to access the object and in which mode (e.g., read or write). Ownership is usually acquired as a consequence of creating the object or via specified ownership assignment. DAC allows the owner to determine who will have access to objects they control. An example of DAC includes user controlled file permissions. When discretionary access control policies are implemented, subjects are not constrained with regard to what actions they can take with information for which they have already been granted access. Thus, subjects that have been granted access to information are not prevented from passing (i.e., the subjects have the discretion to pass) the information to other subjects or objects. A subject that is constrained in its operation by Mandatory Access Control policies is still able to operate under the less rigorous constraints of this requirement. Thus, while Mandatory Access Control imposes constraints preventing a subject from passing information to another subject operating at a different sensitivity level, this requirement permits the subject to pass the information to any subject at the same sensitivity level. The policy is bounded by the information system boundary. Once the information is passed outside of the control of the information system, additional means may be required to ensure the constraints remain in effect. While the older, more traditional definitions of discretionary access control require identity-based access control, that limitation is not required for this use of discretionary access control.
Checks: C-67729r1_chk

Access the Tanium Server interactively. Log on with an account with administrative privileges to the server. Open an Explorer window. Navigate to the C:\Program Files\Tanium folder\Tanium Server\http folder. Right-click on the \http folder, select “Properties”. Select the “Security” tab, click on the “Advanced” button. Validate the owner of the directory is the [Tanium service account]. Validate System has Read-Only permissions. Right-click on the \legacy folder. Select the “Security” tab, click on the “Advanced” button. Validate the owner of the directory is the [Tanium service account]. Validate the System has Read-Only permissions. Validate the [Tanium service account] has Read-Only permissions. Navigate into the \legacy folder. Validate the \legacy\index.html.bak file does not exist. Right-click on the \libraries folder. Select the “Security” tab, click on the “Advanced” button. Validate the owner of the directory is the [Tanium service account]. Validate System has Read-Only permissions. Validate the [Tanium service account] has Read-Only permissions. Right-click on the \taniumjs folder. Select the “Security” tab, click on the “Advanced” button. Validate the owner of the directory is the [Tanium service account]. Validate System has Read-Only permissions. Validate the [Tanium service account] has Read-Only permissions. Right-click on the \tux folder. Select the “Security” tab, click on the “Advanced” button. Validate the owner of the directory is the [Tanium service account]. Validate System has Read-Only permissions. Validate the [Tanium service account] has Read Only permissions. Right-click on the \tux-console folder. Select the “Security” tab, click on the “Advanced” button. Validate the owner of the directory is the [Tanium service account]. Validate System has Read-Only permissions. Validate the [Tanium service account] has Read-Only permissions. If any of the above permissions are not configured correctly, this is a finding.

Fix: F-73193r1_fix

Access the Tanium Server interactively. Log on with an account with administrative privileges to the server. Open an Explorer window. Navigate to the C:\Program Files\Tanium folder\Tanium Server\http folder. Right-click on the \http folder, select “Properties”. Select the “Security” tab, click on the “Advanced” button. Disable folder inheritance. Change/verify the owner of the directory to the [Tanium service account]. Reduce System to Read-Only permissions. Right-click on the \legacy folder. Select the “Security” tab, click on the “Advanced” button. Disable folder inheritance. Change/verify the owner of the directory to the [Tanium service account]. Delete index.html.bak. Reduce System to Read-Only permissions. Reduce [Tanium service account] to Read-Only permissions. Right-click on the \libraries folder. Select the “Security” tab, click on the “Advanced” button. Disable folder inheritance. Change/verify the owner of the directory to the [Tanium service account]. Reduce System to Read-Only permissions. Reduce [Tanium service account] to Read-Only permissions. Right-click on the \taniumjs folder. Select the “Security” tab, click on the “Advanced” button. Disable folder inheritance. Change/verify the owner of the directory to the [Tanium service account]. Reduce System to Read-Only permissions. Reduce [Tanium service account] to Read-Only permissions. Right-click on the \tux folder. Select the “Security” tab, click on the “Advanced” button. Disable folder inheritance. Change/verify the owner of the directory to the [Tanium service account]. Reduce System to Read-Only permissions. Reduce [Tanium service account] to Read-Only permissions. Right-click on the \tux-console folder. Select the “Security” tab, click on the “Advanced” button. Disable folder inheritance. Change/verify the owner of the directory to the [Tanium service account]. Reduce System to Read-Only permissions. Reduce [Tanium service account] to Read-Only permissions.

b
The permissions on the Tanium Server registry keys must be restricted to only the Tanium service account.
AC-3 - Medium - CCI-002165 - V-67095 - SV-81585r1_rule
RMF Control
AC-3
Severity
Medium
CCI
CCI-002165
Version
TANS-SV-000026
Vuln IDs
  • V-67095
Rule IDs
  • SV-81585r1_rule
Discretionary Access Control (DAC) is based on the notion that individual users are "owners" of objects and therefore have discretion over who should be authorized to access the object and in which mode (e.g., read or write). Ownership is usually acquired as a consequence of creating the object or via specified ownership assignment. DAC allows the owner to determine who will have access to objects they control. An example of DAC includes user controlled file permissions. When discretionary access control policies are implemented, subjects are not constrained with regard to what actions they can take with information for which they have already been granted access. Thus, subjects that have been granted access to information are not prevented from passing (i.e., the subjects have the discretion to pass) the information to other subjects or objects. A subject that is constrained in its operation by Mandatory Access Control policies is still able to operate under the less rigorous constraints of this requirement. Thus, while Mandatory Access Control imposes constraints preventing a subject from passing information to another subject operating at a different sensitivity level, this requirement permits the subject to pass the information to any subject at the same sensitivity level. The policy is bounded by the information system boundary. Once the information is passed outside of the control of the information system, additional means may be required to ensure the constraints remain in effect. While the older, more traditional definitions of discretionary access control require identity-based access control, that limitation is not required for this use of discretionary access control.
Checks: C-67731r1_chk

Access the Tanium Server interactively. Log on with an account with administrative privileges to the server. Run regedit as Administrator. Navigate to HKLM\Local_Machine\Software\Wow6432Node. Right-click on \Tanium, select “Properties”. Click on the “Security” tab, “Advanced” button. Validate the [Tanium service account] is only account with full permissions. Validate the User accounts do not have any permissions. If any other account has full permissions and/or the User account has any permissions, this is a finding.

Fix: F-73195r1_fix

Access the Tanium Server interactively. Log on with an account with administrative privileges to the server. Run regedit as Administrator. Navigate to HKLM\Local_Machine\Software\Wow6432Node. Right-click on \Tanium, select “Properties”. Click on the “Security” tab, “Advanced” button. Provide the [Tanium service account] with full permissions. Reduce permissions for any other accounts with full permissions. Remove permissions for User accounts.

b
The Tanium Server Logs and TDL_Logs directories must be restricted with appropriate permissions.
AC-3 - Medium - CCI-002165 - V-67097 - SV-81587r1_rule
RMF Control
AC-3
Severity
Medium
CCI
CCI-002165
Version
TANS-SV-000027
Vuln IDs
  • V-67097
Rule IDs
  • SV-81587r1_rule
Discretionary Access Control (DAC) is based on the notion that individual users are "owners" of objects and therefore have discretion over who should be authorized to access the object and in which mode (e.g., read or write). Ownership is usually acquired as a consequence of creating the object or via specified ownership assignment. DAC allows the owner to determine who will have access to objects they control. An example of DAC includes user controlled file permissions. When discretionary access control policies are implemented, subjects are not constrained with regard to what actions they can take with information for which they have already been granted access. Thus, subjects that have been granted access to information are not prevented from passing (i.e., the subjects have the discretion to pass) the information to other subjects or objects. A subject that is constrained in its operation by Mandatory Access Control policies is still able to operate under the less rigorous constraints of this requirement. Thus, while Mandatory Access Control imposes constraints preventing a subject from passing information to another subject operating at a different sensitivity level, this requirement permits the subject to pass the information to any subject at the same sensitivity level. The policy is bounded by the information system boundary. Once the information is passed outside of the control of the information system, additional means may be required to ensure the constraints remain in effect. While the older, more traditional definitions of discretionary access control require identity-based access control, that limitation is not required for this use of discretionary access control.
Checks: C-67733r1_chk

Access the Tanium Server interactively. Log on with an account with administrative privileges to the server. Open an Explorer window. Navigate to the C:\Program Files\Tanium folder\Tanium Server folder. Right-click on the \Logs folder, select “Properties”. Click on the “Security” tab, “Advanced” button. Validate the owner of the directory is the [Tanium service account]. Validate the [Tanium service account] privileges is only account with modify permissions on the directory. Validate Administrators have full permissions on the directory. Navigate to the C:\Program Files\Tanium folder\Tanium Server folder. Right-click on the \TDL_Logs folder, select “Properties”. Click on the “Security” tab, “Advanced” button. Validate the owner of the directory is the [Tanium service account]. Validate the [Tanium service account] privileges is only account with modify permissions on the directory. Validate Administrators have full permissions on the directory. If any of the specified permissions are not set as required, this is a finding.

Fix: F-73197r1_fix

Access the Tanium Server interactively. Log on with an account with administrative privileges to the server. Open an Explorer window. Navigate to the C:\Program Files\Tanium folder\Tanium Server folder. Right-click on the \Logs folder, select “Properties”. Click on the “Security” tab, “Advanced” button. Disable folder inheritance. Change/verify the owner of the directory to the [Tanium service account]. Reduce [Tanium service account] privileges to modify permissions on the directory. Ensure Administrators have full permissions on the directory. Navigate to the C:\Program Files\Tanium folder\Tanium Server folder. Right-click on the \TDL_Logs folder, select “Properties”. Click on the “Security” tab, “Advanced” button. Disable folder inheritance. Change/verify the owner of the directory to the [Tanium service account]. Reduce [Tanium service account] privileges to modify permissions on the directory. Ensure Administrators have full permissions on the directory.

b
All Active Directory accounts synchronized with Tanium must be non-privileged domain accounts.
AC-6 - Medium - CCI-002235 - V-67099 - SV-81589r1_rule
RMF Control
AC-6
Severity
Medium
CCI
CCI-002235
Version
TANS-SV-000028
Vuln IDs
  • V-67099
Rule IDs
  • SV-81589r1_rule
Tanium has the ability to synchronize with Active Directory for Tanium account management. Tanium advises that all replicated accounts should be non-privileged domain accounts. In doing so, should a vulnerability in the industry standard OpenSSL libraries used by Tanium ever come to light, no privileged account information could be gained by an attacker. This is simply good housekeeping and should be exercised with any such platform product.
Checks: C-67735r1_chk

Using a web browser on a system that has connectivity to the Tanium Server, access the Tanium Server web user interface (UI) and log on with CAC. Click on the “Administration” tab. Click on the “Users” tab. Review each of the users listed and determine their Active Directory synced account. Access one of the domain's Active Directory Domain Controller servers with a Domain Administrator account. Review each of the Users for which a synced account is in the Tanium console as a user. Validate whether any of the users have Domain Admin, Enterprise Admin, or any other elevated privileges in the domain. If any of the Active Directory accounts have elevated privileges and are synced as a Tanium user account, this is a finding.

Fix: F-73199r1_fix

Access one of the domain's Active Directory Domain Controller servers with a Domain Administrator account. For each of the Users for which a synced account is in the Tanium console as a user and for which the account has elevated privileges, remove those accounts from the Tanium synced security group in Active Directory. Verify, after syncing with Tanium, the user account is no longer in Tanium as a User.

b
A connector must be configured to send log data to offline log collection.
AU-4 - Medium - CCI-001851 - V-67101 - SV-81591r1_rule
RMF Control
AU-4
Severity
Medium
CCI
CCI-001851
Version
TANS-SV-000029
Vuln IDs
  • V-67101
Rule IDs
  • SV-81591r1_rule
While the Tanium Server records audit log entries to the Tanium SQL database, retrieval and aggregation of log data through the Tanium console is not efficient. The Tanium Connect module allows for ArcSight, McAfee SIEM, SIEM, Splunk SIEM, and LogRhythm connectors in order to facilitate forensic data retrieval and aggregation efficiently.
Checks: C-67737r1_chk

Using a web browser on a system that has connectivity to the Tanium Server, access the Tanium Server web user interface (UI) and log on with CAC. Click on "Administration". Select the "Connect" tab. Click on "Configured Connectors". Review for any configured "ArcSight", “McAfee SIEM", "SIEM", "Splunk" or "LogRhythm" connectors. If SIEM connectors are not configured for send log data to offline log collection, this is a finding.

Fix: F-73201r1_fix

Using a web browser on a system that has connectivity to the Tanium Server, access the Tanium Server web user interface (UI) and log on with CAC. Click on "Administration". Select the "Connect" tab. Click on "Connector Templates". Choose and configure a template for a SIEM located at the site.

b
Firewall rules must be configured on the Tanium module server to allow Server-to-Module Server communications from the Tanium Server.
CM-7 - Medium - CCI-001762 - V-67103 - SV-81593r1_rule
RMF Control
CM-7
Severity
Medium
CCI
CCI-001762
Version
TANS-SV-000031
Vuln IDs
  • V-67103
Rule IDs
  • SV-81593r1_rule
Tanium 6.5 introduces the Tanium Module Server (formerly known as the Tanium Plugin Server) used to extend the functionality of Tanium through the use of various workbenches. The Tanium Module Server requires communication with the Tanium Server on port 17477. https://kb.tanium.com/Port_Configuration_v6.5
Checks: C-67739r1_chk

Consult with the Tanium System Administrator to verify which firewall is being used as a host-based firewall on the Tanium Module Server. Access the host-based firewall configuration on the Tanium Module Server. Validate a rule exists for the following: Port Needed: Tanium Server to Tanium Module Server over TCP port 17477. If a host-based firewall rule does not exist to allow TCP port 17477, from the Tanium Server to the Tanium Module Server, this is a finding. Consult with the network firewall administrator and validate rules exist for the following: Allow TCP traffic on port 17477 from the Tanium Server to the Tanium Module Server. If a network firewall rule does not exist to allow TCP traffic on port 17477 from the Tanium Server to the Tanium Module Server, this is a finding.

Fix: F-73203r1_fix

Configure host-based firewall rules on the Tanium Module server to include the following required traffic: Allow TCP traffic on port 17477 from the Tanium Server. Configure the network firewall to allow the above traffic.

b
Firewall rules must be configured on the Tanium Server for Server-to-Module Server communications.
CM-7 - Medium - CCI-001762 - V-67105 - SV-81595r1_rule
RMF Control
CM-7
Severity
Medium
CCI
CCI-001762
Version
TANS-SV-000032
Vuln IDs
  • V-67105
Rule IDs
  • SV-81595r1_rule
Tanium 6.5 introduces the Tanium Module Server (formerly known as the Tanium Plugin Server) used to extend the functionality of Tanium through the use of various workbenches. The Tanium Module Server requires communication with the Tanium Server on port 17477. Port Needed: Tanium Server to Tanium Module Server over TCP port 17477. Network firewall rules: Allow TCP traffic on port 17477 from the Tanium Server to the Tanium Module Server. https://kb.tanium.com/Port_Configuration_v6.5
Checks: C-67741r1_chk

Consult with the Tanium System Administrator to verify which firewall is being used as a host-based firewall on the Tanium Server. Access the host-based firewall configuration on the Tanium Server. Validate a rule exists for the following: Port Needed: Tanium Server to Tanium Module Server over TCP port 17477. If a host-based firewall rule does not exist to allow TCP port 17477, from the Tanium Server to the Tanium Module Server, this is a finding. Consult with the network firewall administrator and validate rules exist for the following: Allow TCP traffic on port 17477 from the Tanium Server to the Tanium Module Server. If a network firewall rule does not exist to allow TCP traffic on port 17477 from the Tanium Server to the Tanium Module Server, this is a finding.

Fix: F-73205r1_fix

Configure host-based firewall rules on the Tanium Server to allow the following required traffic: Allow TCP traffic on port 17477 to the Tanium Module Server. Configure the network firewall to allow the above traffic.

b
Firewall rules must be configured on the Tanium Server for Server-to-Zone Server communications.
CM-7 - Medium - CCI-001762 - V-67107 - SV-81597r1_rule
RMF Control
CM-7
Severity
Medium
CCI
CCI-001762
Version
TANS-SV-000033
Vuln IDs
  • V-67107
Rule IDs
  • SV-81597r1_rule
If you are using the Tanium Zone Server to proxy traffic from Tanium-managed computers on less trusted network segments to the Tanium Server on the core network, then the Tanium Zone Server Hub, typically installed to the Tanium Server device, must be able to connect to the Zone Server(s) in the DMZ. This is the only configuration that requires you to allow outbound traffic on port 17472 from the Tanium Server device. The ZoneServerList.txt configuration file located in the Tanium Zone Server Hub's installation folder identifies the addresses of the destination Zone Servers. See the Zone Server Configuration page for more details. Port Needed: Tanium Server to Zone Server over TCP port 17472. Network firewall rules: Allow TCP traffic on port 17472 from the Zone Server Hub, usually the Tanium Server device, to the destination DMZ devices(s) hosting the Zone Server(s). Endpoint firewall rules - for additional security, configure the following endpoint firewall rules: Allow TCP traffic outbound on port 17472 from only the Zone Server Hub process running on the Tanium Server device Allow TCP traffic inbound on port 17472 to only the Zone Server process running on the designated Zone Server device(s). https://kb.tanium.com/Port_Configuration_v6.5
Checks: C-67743r1_chk

Note: If a Zone Server is not being used, this is Not Applicable. Consult with the Tanium System Administrator to verify which firewall is being used as a host-based firewall on the Tanium Server. Access the host-based firewall configuration on the Tanium Server. Validate a rule exists for the following: Port Needed: Tanium Server to Zone Server over TCP port 17472. If a host-based firewall rule does not exist to allow TCP port 17472, bi-directionally, from Tanium Server to the Tanium Zone Server, this is a finding.

Fix: F-73207r1_fix

Configure host-based firewall rules on the Tanium Zone server to include the following required traffic: Allow Tanium Server to Zone Server over TCP port 17472. Configure the network firewall to allow the above traffic.

b
The Tanium application must authenticate all endpoint devices before allowing a network connection using bidirectional authentication that is cryptographically based.
IA-3 - Medium - CCI-001967 - V-67109 - SV-81599r1_rule
RMF Control
IA-3
Severity
Medium
CCI
CCI-001967
Version
TANS-SV-000034
Vuln IDs
  • V-67109
Rule IDs
  • SV-81599r1_rule
Without authenticating devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. Bidirectional authentication provides stronger safeguards to validate the identity of other devices for connections that are of greater risk. For distributed architectures (e.g., service-oriented architectures), the decisions regarding the validation of authentication claims may be made by services separate from the services acting on those decisions. In such situations, it is necessary to provide authentication decisions (as opposed to the actual authenticators) to the services that need to act on those decisions. A local connection is any connection with a device communicating without the use of a network. A network connection is any connection with a device that communicates through a network (e.g., local area or wide area network, Internet). A remote connection is any connection with a device communicating through an external network (e.g., the Internet). Because of the challenges of applying this requirement of a large scale, organizations are encouraged to only apply the requirement to those limited number (and type) of devices that truly need to support this capability.
Checks: C-67745r1_chk

Using a web browser on a system that has connectivity to the Tanium Server, access the Tanium Server web user interface (UI) and log on with CAC. Click on "Administration". Select the "Global Settings" tab. In the search box beside "Show Settings Containing:" type "sign_all_questions_flag". Enter. If no results are returned, this is a finding since this setting needs to be explicitly set. If results are returned for sign_all_questions_flag but the value is not "1", this is a finding.

Fix: F-73209r1_fix

Using a web browser on a system that has connectivity to the Tanium Server, access the Tanium Server web user interface (UI) and log on with CAC. Click on "Administration". Select the "Global Settings" tab. Click on "+ Add New Setting". In "Create New Setting" dialog box, enter "sign_all_questions_flag" for "Setting Name:". Enter "1" for "Setting Value:". Select "Numeric" from "Value Type" drop-down list. Select "Server" from "Affects" drop-down list. Click “Save”.

b
The SSLHonorCipherOrder DWORD must be configured to disable weak encryption algorithms on the Tanium Server.
SC-13 - Medium - CCI-002450 - V-67111 - SV-81601r2_rule
RMF Control
SC-13
Severity
Medium
CCI
CCI-002450
Version
TANS-SV-000035
Vuln IDs
  • V-67111
Rule IDs
  • SV-81601r2_rule
Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to protect data. The application must implement cryptographic modules adhering to the higher standards approved by the federal government since this provides assurance they have been tested and validated.
Checks: C-67747r1_chk

Access the Tanium Server interactively. Log on with an account with administrative privileges to the server. Access the server's registry by typing: regedit &lt;enter&gt; Navigate to HKLM &gt;&gt; Software &gt;&gt; Wow6432Node &gt;&gt; Tanium &gt;&gt; Tanium Server. Verify the existence of a DWORD "SSLHonorCipherOrder" with a value of "0x00000001" (hex). If the DWORD "SSLHonorCipherOrder" does not exist with a value of "0x00000001" (hex), this is a finding.

Fix: F-73211r1_fix

Access the Tanium Server interactively. Log on with an account with administrative privileges to the server. Access the server's registry by typing: regedit <enter> Navigate to HKLM >> Software >> Wow6432Node >> Tanium >> Tanium Server. Add or modify the DWORD "SSLHonorCipherOrder" to have a value of 0x00000001 (hex).

b
The Tanium Server certificate must be signed by a DoD Certificate Authority.
SC-23 - Medium - CCI-002470 - V-67113 - SV-81603r1_rule
RMF Control
SC-23
Severity
Medium
CCI
CCI-002470
Version
TANS-SV-000036
Vuln IDs
  • V-67113
Rule IDs
  • SV-81603r1_rule
The Tanium Server has the option to use a "self-signed" certificate or a Trusted Certificate Authority signed certificate for SSL connections. During evaluations of Tanium in Lab settings, customers often conclude that a "self-signed" certificate is an acceptable risk. However, in production environments it is critical that a SSL certificate signed by a Trusted Certificate Authority be used on the Tanium Server in lieu of an untrusted and insecure "self-signed" certificate.
Checks: C-67749r1_chk

Access the Tanium Server console via a web browser. When connected, review the Certificate for the Tanium Server. (In Internet Explorer, right-click on the page, select “Properties”, click on the “Certificates” tab.) On the “General” tab, validate the Certificate shows as issued by DOD CA-##. On Certification “Path” tab, validate the path top-level is DoD Root CA 2. If the certificate authority is not DoD Root, this is a finding.

Fix: F-73213r1_fix

Request or regenerate the certificate from a DoD Certificate Authority.

b
Any configured EMAIL RESULTS connectors must be configured to enable TLS/SSL to encrypt communications.
SC-8 - Medium - CCI-002422 - V-67115 - SV-81605r1_rule
RMF Control
SC-8
Severity
Medium
CCI
CCI-002422
Version
TANS-SV-000037
Vuln IDs
  • V-67115
Rule IDs
  • SV-81605r1_rule
Information can be either unintentionally or maliciously disclosed or modified during preparation for transmission including, for example, during aggregation, at protocol transformation points, and during packing/unpacking. These unauthorized disclosures or modifications compromise the confidentiality or integrity of the information. This requirement applies only to those applications that are either distributed or can allow access to data non-locally. Use of this requirement will be limited to situations where the data owner has a strict requirement for ensuring data integrity and confidentiality is maintained at every step of the data transfer and handling process. When transmitting data, applications need to leverage transmission protection mechanisms, such as TLS, SSL VPNs, or IPSEC. An example of this would be the SMTP queue. The SMTP mail protocol places email messages into a centralized queue prior to transmission. If someone were to modify an email message contained in the queue and the SMTP protocol did not check to ensure the email message was not modified while it was stored in the queue, a modified email could be sent.
Checks: C-67751r1_chk

Using a web browser on a system that has connectivity to the Tanium Server, access the Tanium Server web user interface (UI) and log on with CAC. Click on "Administration". Select the "Connect" tab. Click on "Configured Connectors". If no "Email Results" connectors are configured, this is Not Applicable. For each "Email Results" connector, select the connector to reveal its properties. Validate the "Enable TLS/SSL" is set to "true". If any configured "Email Results" connectors are configured for "Enable TLS/SSL" set to "false", this is a finding.

Fix: F-73215r1_fix

Using a web browser on a system that has connectivity to the Tanium Server, access the Tanium Server web user interface (UI) and log on with CAC. Click on "Administration". Select the "Connect" tab. Click on "Configured Connectors". Select each "Email Results" connector which is configured with "Enable TLS/SSL" set to "false". Click the "Edit" button at the top right of the screen. Place a check in the "Enable TLS/SSL" check box. Click on “Save Changes”.

b
The Tanium Server must ensure the authenticity of communications sessions when making requests from Tanium Clients.
SC-23 - Medium - CCI-001184 - V-67117 - SV-81607r1_rule
RMF Control
SC-23
Severity
Medium
CCI
CCI-001184
Version
TANS-SV-000038
Vuln IDs
  • V-67117
Rule IDs
  • SV-81607r1_rule
Authenticity protection provides protection against man-in-the-middle attacks/session hijacking and the insertion of false information into sessions. Application communication sessions are protected utilizing transport encryption protocols, such as SSL or TLS. SSL/TLS provides web applications with a means to be able to authenticate user sessions and encrypt application traffic. Session authentication can be single (one-way) or mutual (two-way) in nature. Single authentication authenticates the server for the client, whereas mutual authentication provides a means for both the client and the server to authenticate each other. This requirement applies to applications that utilize communications sessions. This includes, but is not limited to, web-based applications and Service-Oriented Architectures (SOA). This requirement addresses communications protection at the application session, versus the network packet, and establishes grounds for confidence at both ends of communications sessions in ongoing identities of other parties and in the validity of information transmitted. Depending on the required degree of confidentiality and integrity, web services/SOA will require the use of SSL/TLS mutual authentication (two-way/bidirectional).
Checks: C-67753r1_chk

Using a web browser on a system that has connectivity to the Tanium Server, access the Tanium Server web user interface (UI) and log on with CAC. Click on "Administration". Select the "Global Settings" tab. In the search box beside "Show Settings Containing:" type "sign_all_questions_flag". Enter. If no results are returned, this is a finding since this setting needs to be explicitly set. If results are returned for sign_all_questions_flag but the value is not "1", this is a finding.

Fix: F-73217r1_fix

Using a web browser on a system that has connectivity to the Tanium Server, access the Tanium Server web user interface (UI) and log on with CAC. Click on "Administration". Select the "Global Settings" tab. Click on "+ Add New Setting". In "Create New Setting" dialog box, enter "sign_all_questions_flag" for "Setting Name:". Enter "1" for "Setting Value:". Select "Numeric" from "Value Type" drop-down list. Select "Server" from "Affects" drop-down list. Click “Save”.

b
File integrity monitoring of critical executables that Tanium uses must be configured.
CM-11 - Medium - CCI-001811 - V-67119 - SV-81609r1_rule
RMF Control
CM-11
Severity
Medium
CCI
CCI-001811
Version
TANS-SV-000030
Vuln IDs
  • V-67119
Rule IDs
  • SV-81609r1_rule
Tanium inherently watches files and their respective hash values for change but while Tanium can do file integrity checks of critical executables, it is important to conduct File Integrity Monitoring (FIM) via an outside service such as Host Based Security System (HBSS) or similar security suites with FIM capability. These technologies provide independent monitoring of critical Tanium and system binaries.
Checks: C-67755r2_chk

If the site is using Tanium Index, Index should be used to monitor the file integrity of Tanium critical files. If Tanium Index is not installed, a third-party file integrity monitoring tool must be used to monitor Tanium critical executables, defined as all files in the Tanium Server installed path. If the file integrity of Tanium critical executables is not monitored, this is a finding.

Fix: F-73219r2_fix

Implement a file integrity monitoring system to monitor the Tanium critical executable files.

c
Tanium version must be greater than version 7.
High - V-99629 - SV-108733r1_rule
RMF Control
Severity
High
CCI
Version
TANS-SV-000050
Vuln IDs
  • V-99629
Rule IDs
  • SV-108733r1_rule
Tanium version 6.5 is end of life and out of vendor support.
Checks: C-98479r1_chk

Validate Tanium version. If running version 6.5, this is a finding.

Fix: F-105313r1_fix

Upgrade to Tanium 7 or higher.