Tanium 7.x Application on TanOS Security Technical Implementation Guide

Description

This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: [email protected]

Details

Version / Release: V1R1

Published: 2022-10-31

Updated At: 2023-01-25 00:47:49

Actions

Download

Filter

Findings
Severity Open Not Reviewed Not Applicable Not a Finding
Overall 0 0 0 0
Low 0 0 0 0
Medium 0 0 0 0
High 0 0 0 0
Drop CKL or SCAP (XCCDF) results here.

    Vuln Rule Version CCI Severity Title Description Status Finding Details Comments
    SV-254874r867522_rule TANS-AP-000005 CCI-000054 MEDIUM The Tanium max_soap_sessions_total setting must be explicitly enabled to limit the number of simultaneous sessions. Application management includes the ability to control the number of users and user sessions that utilize an application. Limiting the number of allowed users and sessions per user is helpful in limiting risks related to DoS attacks. This requirement ma
    SV-254875r867525_rule TANS-AP-000010 CCI-000054 MEDIUM The Tanium max_soap_sessions_per_user setting must be explicitly enabled to limit the number of simultaneous sessions. Application management includes the ability to control the number of users and user sessions that utilize an application. Limiting the number of allowed users and sessions per user is helpful in limiting risks related to DoS attacks. This requirement ma
    SV-254876r867528_rule TANS-AP-000020 CCI-000057 MEDIUM The Tanium Application Server console must be configured to initiate a session lock after a 15-minute period of inactivity. The Tanium Console, when multi-factor authentication is enabled, will initiate a session lock based upon the ActivClient or other Smart Card software. By initiating the session lock, the console will be locked and not allow unauthorized access by anyon
    SV-254877r867531_rule TANS-AP-000040 CCI-001453 MEDIUM The Tanium endpoint must have the Tanium Server's pki.db in its installation. Without cryptographic integrity protections in the Tanium Client, information could be altered by unauthorized users without detection. Cryptographic mechanisms used for protecting the integrity of Tanium communications information include signed hash fu
    SV-254878r867534_rule TANS-AP-000045 CCI-001453 MEDIUM Tanium Trusted Content providers must be documented. A Tanium Sensor, also called content, enables an organization to gather real-time inventory, configuration, and compliance data elements from managed computers. Sensors gather specific information from the local device and then write the results to the co
    SV-254879r867537_rule TANS-AP-000050 CCI-001453 MEDIUM Content providers must provide their public key to the Tanium administrator to import for validating signed content. A Tanium Sensor, also called content, enables an organization to gather real-time inventory, configuration, and compliance data elements from managed computers. Sensors gather specific information from the local device and then write the results to the co
    SV-254880r867540_rule TANS-AP-000055 CCI-001453 MEDIUM Tanium public keys of content providers must be validated against documented trusted content providers. A Tanium Sensor, also called content, enables an organization to gather real-time inventory, configuration, and compliance data elements from managed computers. Sensors gather specific information from the local device and then write the results to the co
    SV-254881r867543_rule TANS-AP-000065 CCI-000015 MEDIUM The Tanium Application Server must be configured to only use LDAP for account management functions. Enterprise environments make application account management challenging and complex. A manual process for account management functions adds the risk of a potential oversight or other error. To reduce risk, the Tanium Application Server must be configur
    SV-254882r867546_rule TANS-AP-000100 CCI-000213 MEDIUM Tanium Computer Groups must be used to restrict console users from affecting changes to unauthorized computers. Computer Groups allow a site running Tanium to assign responsibility of specific Computer Groups to specific Tanium console users. By doing so, a desktop administrator, for example, will not have the ability to enforce an action against a high visibility
    SV-254883r867549_rule TANS-AP-000105 CCI-000213 MEDIUM Documentation identifying Tanium console users, their respective User Groups, Computer Groups, and Roles must be maintained. System access must be reviewed periodically to verify all Tanium users are assigned the appropriate functional role, with the least privileged access possible to perform assigned tasks being the recommended best practice to avoid unauthorized access.
    SV-254884r867552_rule TANS-AP-000110 CCI-000213 MEDIUM The Tanium application must be configured to use Tanium User Groups in a manner consistent with the model outlined within the environment's system documentation. It is important for information system owners to document authorized user groups for the Tanium application to avoid unauthorized access to systems. Misaligned implementation of user groups grants excessive access and results in potential compromise of "n
    SV-254885r867555_rule TANS-AP-000115 CCI-000213 MEDIUM Documentation identifying Tanium console users and their respective Computer Group rights must be maintained. System access must be reviewed periodically to verify all Tanium users are assigned the appropriate computer groups, with the least privileged access possible to perform assigned tasks. Users who have been removed from the documentation should no longer b
    SV-254886r867558_rule TANS-AP-000120 CCI-000213 MEDIUM The Tanium Action Approval feature must be enabled for two-person integrity when deploying actions to endpoints. The Tanium Action Approval feature provides a two-person integrity control mechanism designed to achieve a high-level of security and reduce the possibility of error for critical operations. When this feature is enabled, an action configured by one Taniu
    SV-254887r867561_rule TANS-AP-000130 CCI-001414 MEDIUM The Tanium documentation identifying recognized and trusted IOC streams must be maintained. Using trusted and recognized IOC sources may detect and prevent systems from becoming compromised. An IOC stream is a series or stream of IOCs that are imported from a vendor based on a subscription service. An IOC stream can be downloaded manually or on
    SV-254888r867564_rule TANS-AP-000135 CCI-001414 MEDIUM Tanium Threat Response must be configured to receive IOC streams only from trusted sources. Using trusted and recognized IOC sources may detect and prevent systems from becoming compromised. An IOC stream is a series or stream of intel that is imported from a vendor based on a subscription service or manually downloaded and placed in a folder. T
    SV-254889r867567_rule TANS-AP-000140 CCI-001414 MEDIUM The Tanium documentation identifying recognized and trusted folders for Threat Response Local Directory Source must be maintained. Using trusted and recognized IOC sources may detect and prevent systems from becoming compromised. An IOC stream is a series or stream of IOCs that are imported from a vendor based on a subscription service or manually downloaded and placed in a folder. T
    SV-254890r867570_rule TANS-AP-000145 CCI-001414 MEDIUM The Tanium Threat Response Local Directory Source must be configured to restrict access to only authorized maintainers of Threat Intel. Using trusted and recognized IOC sources may detect and prevent systems from becoming compromised. An IOC stream is a series or stream of intel imported from a vendor based on a subscription service or manually downloaded and placed in a folder. Threat Re
    SV-254891r867573_rule TANS-AP-000150 CCI-001414 MEDIUM The Tanium documentation identifying recognized and trusted SCAP sources must be maintained. NIST validated SCAP XML documents are provided from several possible sources such as DISA, NIST, and the other nongovernment entities. These documents are used as the basis of compliance definitions leveraged to automate compliance auditing of systems. Th
    SV-254892r867576_rule TANS-AP-000155 CCI-001414 MEDIUM The Tanium documentation identifying recognized and trusted OVAL feeds must be maintained. OVAL XML documents are provided from several possible sources such as the CIS open source repository, or any number of vendor/third-party paid repositories. These documents are used to automate the passive validation of vulnerabilities on systems and ther
    SV-254893r867579_rule TANS-AP-000160 CCI-001414 MEDIUM Tanium Comply must be configured to receive SCAP content only from trusted sources. NIST-validated SCAP XML documents are provided from several possible sources such as DISA, NIST, and the other nongovernment entities. These documents are used as the basis of compliance definitions leveraged to automate compliance auditing of systems. Th
    SV-254894r867582_rule TANS-AP-000165 CCI-001414 MEDIUM Tanium Comply must be configured to receive OVAL feeds only from trusted sources. OVAL XML documents are provided from several possible sources such as the CIS open source repository, or any number of vendor/third party paid repositories. These documents are used to automate the passive validation of vulnerabilities on systems and ther
    SV-254895r867585_rule TANS-AP-000175 CCI-000048 MEDIUM The publicly accessible Tanium application must display the Standard Mandatory DOD Notice and Consent Banner before granting access to the application. Display of a standardized and approved use notification before granting access to the publicly accessible application ensures privacy and security notification verbiage used is consistent with applicable federal laws, Executive Orders, directives, policie
    SV-254896r867588_rule TANS-AP-000180 CCI-000050 MEDIUM The publicly accessible Tanium application must retain the Standard Mandatory DOD Notice and Consent Banner on the screen until users acknowledge the usage conditions and take explicit actions to log on for further access. Display of a standardized and approved use notification before granting access to the publicly accessible application ensures privacy and security notification verbiage used is consistent with applicable federal laws, Executive Orders, directives, policie
    SV-254897r867591_rule TANS-AP-000195 CCI-000056 MEDIUM Multi-factor authentication must be enabled and enforced on the Tanium Server for all access and all accounts. To ensure accountability and prevent unauthenticated access, organizational users must be identified and authenticated to prevent potential misuse and compromise of the system. Organizational users include organizational employees or individuals the orga
    SV-254898r867594_rule TANS-AP-000260 CCI-000139 MEDIUM The Tanium application must alert the ISSO and SA (at a minimum) in the event of an audit processing failure. It is critical for the appropriate personnel to be aware if a system is at risk of failing to process audit logs as required. Without this notification, the security personnel may be unaware of an impending failure of the audit capability and system opera
    SV-254899r870360_rule TANS-AP-000270 CCI-000154 MEDIUM The Tanium application must be configured to send audit records from multiple components within the system to a central location for review and analysis of audit records. Successful incident response and auditing relies on timely, accurate system information and analysis to allow the organization to identify and respond to potential incidents in a proficient manner. If the application does not provide the ability to centra
    SV-254900r867600_rule TANS-AP-000280 CCI-000158 MEDIUM The Tanium applications must provide the capability to filter audit records for events of interest based upon organization-defined criteria. The ability to specify the event criteria of interest provides the persons reviewing the logs with the ability to quickly isolate and identify these events without having to review entries that are of little or no consequence to the investigation. Without
    SV-254901r870361_rule TANS-AP-000295 CCI-000163 MEDIUM Access to Tanium logs on each endpoint must be restricted by permissions. For the Tanium Client software to run without impact from external negligent or malicious changes, the permissions on the Tanium log files and their directory must be restricted. Tanium is deployed with a Client Hardening Solution. This solution, when ap
    SV-254902r867606_rule TANS-AP-000305 CCI-001493 MEDIUM The Tanium application must prohibit user installation, modification, or deletion of software without explicit privileged status. Allowing regular users to install, modify, or delete software, without explicit privileges, creates the risk that the application performs in an inconsistent manner from its design. Explicit privileges (escalated or administrative privileges) provide the
    SV-254903r867609_rule TANS-AP-000330 CCI-001184 MEDIUM The Tanium cryptographic signing capabilities must be enabled on the Tanium Clients to safeguard the authenticity of communications sessions when answering requests from the Tanium Server. All of Tanium's signing capabilities should be enabled upon install. Tanium supports the cryptographic signing and verification before execution of all Sensors, Questions, Actions, Sensor Libraries, File Shards, etc. Enabling signing does away with the ab
    SV-254904r870362_rule TANS-AP-000335 CCI-001084 MEDIUM The Tanium cryptographic signing capabilities must be enabled on the Tanium Server. All of Tanium's signing capabilities must be enabled upon install. Tanium supports the cryptographic signing and verification before execution of all Sensors, Questions, Actions, Sensor Libraries, File Shards, etc. Enabling signing does away with the abil
    SV-254905r867615_rule TANS-AP-000355 CCI-000382 MEDIUM Firewall rules must be configured on the Tanium Endpoints for Client-to-Server communications. In addition to the client-to-server TCP communication that takes place over port 17472, Tanium Clients also communicate to other Tanium-managed computers over port 17472. Without proper firewall configurations, proper TCP communications may not take place
    SV-254906r867618_rule TANS-AP-000360 CCI-000382 MEDIUM Firewall rules must be configured on the Tanium Server for Client-to-Server communications. In addition to the client-to-server TCP communication that takes place over port 17472, Tanium Clients also communicate to other Tanium-managed computers over port 17472. Without proper firewall configurations, proper TCP communications may not take place
    SV-254907r867621_rule TANS-AP-000365 CCI-000382 MEDIUM Firewall rules must be configured on the Tanium Zone Server for Client-to-Zone Server communications. In customer environments using the Tanium Zone Server, a Tanium Client may be configured to point to a Zone Server instead of a Tanium Server. The communication requirements for these Clients are identical to the Server-to-Client requirements. Without pro
    SV-254908r867624_rule TANS-AP-000370 CCI-000382 MEDIUM The Tanium Application Server must be configured to prohibit or restrict the use of organization-defined functions, ports, protocols, and/or services, as defined in the PPSM CAL and vulnerability assessments. To prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling (i.e., embedding of data types within data types), organizations must disable or restrict unused or unnecessary physical and logical ports/proto
    SV-254909r867627_rule TANS-AP-000415 CCI-000778 MEDIUM The Tanium endpoint must have the Tanium Servers public key in its installation. Without cryptographic integrity protections, information can be altered by unauthorized users without detection. Remote access is access to DOD nonpublic information systems by an authorized user (or an information system) communicating through an extern
    SV-254910r867630_rule TANS-AP-000425 CCI-000205 MEDIUM The Tanium application must enforce a minimum 15-character password length. The shorter the password, the lower the number of possible combinations that need to be tested before the password is compromised. Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and bru
    SV-254911r867633_rule TANS-AP-000430 CCI-000200 MEDIUM The Tanium application must prohibit password reuse for a minimum of five generations. Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute-force attacks. To meet password policy requirements, passwords need to be changed at specific policy-based intervals. If the in
    SV-254912r867636_rule TANS-AP-000470 CCI-000198 MEDIUM Tanium must enforce 24 hours/1 day as the minimum password lifetime. Enforcing a minimum password lifetime helps prevent repeated password changes to defeat the password reuse or history enforcement requirement.
    SV-254913r867639_rule TANS-AP-000475 CCI-000199 MEDIUM The Tanium application must enforce a 60-day maximum password lifetime restriction. Any password, no matter how complex, can eventually be cracked. Therefore, passwords need to be changed at specific intervals. One method of minimizing this risk is to use complex passwords and periodically change them. If the application does not limit
    SV-254914r867642_rule TANS-AP-000480 CCI-000185 MEDIUM The Tanium Server certificates must have Extended Key Usage entries for the serverAuth object TLS Web Server Authentication and the clientAuth object TLS Web Client Authentication. Restricting this setting limits the user's ability to change their password. Passwords need to be changed at specific policy based intervals; however, if the application allows the user to immediately and continually change their password, then the passwo
    SV-254915r867645_rule TANS-AP-000490 CCI-000187 MEDIUM The Tanium application must be configured for LDAP user/group synchronization to map the authenticated identity to the individual user or group account for PKI-based authentication. Without mapping the certificate used to authenticate to the user account, the ability to determine the identity of the individual user or group will not be available for forensic analysis.
    SV-254916r867648_rule TANS-AP-000505 CCI-000804 MEDIUM The Tanium application must uniquely identify and authenticate nonorganizational users (or processes acting on behalf of nonorganizational users). Lack of authentication and identification enables nonorganizational users to gain access to the application or possibly other information systems and provides an opportunity for intruders to compromise resources within the application or information syste
    SV-254917r867651_rule TANS-AP-000555 CCI-001082 MEDIUM The Tanium application must separate user functionality (including user interface services) from information system management functionality. Application management functionality includes functions necessary for administration and requires privileged user access. Allowing nonprivileged users to access application management functionality capabilities increases the risk that nonprivileged users
    SV-254918r867654_rule TANS-AP-000600 CCI-001665 MEDIUM The Tanium Server and Client applications must have logging enabled. Failure to a known state can address safety or security in accordance with the mission/business needs of the organization. Failure to a known secure state helps prevent a loss of confidentiality, integrity, or availability in the event of a failure of the
    SV-254919r867657_rule TANS-AP-000630 CCI-001094 MEDIUM The Tanium application must restrict the ability of individuals to use information systems to launch organization-defined Denial of Service (DoS) attacks against other information systems. The Tanium Action Approval feature provides a two-person integrity control mechanism designed to achieve a high-level of security and reduce the possibility of error for critical operations and DoS conditions. When this feature is enabled, an action conf
    SV-254920r867660_rule TANS-AP-000635 CCI-001095 MEDIUM The Tanium application must manage bandwidth throttles to limit the effects of information flooding types of Denial of Service (DoS) attacks. DoS is a condition when a resource is not available for legitimate users. When this occurs, the organization either cannot accomplish its mission or must operate at degraded capacity. In the case of application DoS attacks, care must be taken when desig
    SV-254921r867663_rule TANS-AP-000655 CCI-001314 MEDIUM The Tanium application must reveal error messages only to the ISSO, ISSM, and SA. Only authorized personnel should be aware of errors and the details of the errors. Error messages are an indicator of an organization's operational state or can identify the application. Additionally, Personally Identifiable Information (PII) and operatio
    SV-254922r867666_rule TANS-AP-000660 CCI-001233 MEDIUM The Tanium application must employ automated mechanisms to determine the state of information system components with regard to flaw remediation using the following frequency: Continuously, where ESS is used; 30 days, for any additional internal network scans not covered by ESS; and annually, for external scans by Computer Network Defense Service Provider (CNDSP). Without the use of automated mechanisms to scan for security flaws on a continuous and/or periodic basis, the system components may remain vulnerable to the exploits presented by undetected software flaws. To support this requirement, the flaw remediatio
    SV-254923r867669_rule TANS-AP-000700 CCI-001683 MEDIUM Tanium must notify SA and ISSO when accounts are created. Once an attacker establishes initial access to a system, the attacker often attempts to create a persistent method of re-establishing access. One way to accomplish this is for the attacker to simply create a new account. Notification of account creation i
    SV-254924r867672_rule TANS-AP-000705 CCI-001684 MEDIUM Tanium must notify system administrators and ISSO when accounts are modified. When application accounts are modified, user accessibility is affected. Accounts are utilized for identifying individual users or for identifying the application processes themselves. Sending notification of account modification events to the system admin
    SV-254925r867675_rule TANS-AP-000710 CCI-001685 MEDIUM Tanium must notify system administrators and ISSO for account disabling actions. When application accounts are disabled, user accessibility is affected. Accounts are utilized for identifying individual users or for identifying the application processes themselves. Sending notification of account disabling events to the system administ
    SV-254926r867678_rule TANS-AP-000715 CCI-001686 MEDIUM Tanium must notify system administrators and ISSO for account removal actions. When application accounts are removed, user accessibility is affected. Accounts are utilized for identifying users or for identifying the application processes themselves. Sending notification of account removal events to the system administrator and ISSO
    SV-254927r867681_rule TANS-AP-000720 CCI-002361 MEDIUM The Tanium application must set an inactive timeout for sessions. Leaving sessions open indefinitely is a major security risk. An attacker can easily use an already authenticated session to access the hosted application as the previously authenticated user. By closing sessions after a set period of inactivity, the web s
    SV-254928r867684_rule TANS-AP-000765 CCI-001084 MEDIUM The Tanium Application Server must be configured with a connector to sync to Microsoft Active Directory for account management functions. By restricting access to the Tanium Server to only Microsoft Active Directory, user accounts and related permissions can be strictly monitored. Account management will be under the operational responsibility of the System Administrator for the Windows Ope
    SV-254929r867687_rule TANS-AP-000780 CCI-002132 MEDIUM Tanium must notify system administrator and ISSO of account enabling actions. Once an attacker establishes access to an application, the attacker often attempts to create a persistent method of re-establishing access. One way to accomplish this is for the attacker to simply enable a new or disabled account. Sending notification of
    SV-254930r867690_rule TANS-AP-000800 CCI-002165 MEDIUM Control of the Tanium Client service must be restricted to SYSTEM access only for all managed clients. The reliability of the Tanium client's ability to operate depends upon controlling access to the Tanium client service. By restricting access to SYSTEM access only, the non-Tanium system administrator will not have the ability to impact operability of the
    SV-254931r867693_rule TANS-AP-000805 CCI-002165 MEDIUM The ability to uninstall the Tanium Client service must be disabled on all managed clients. By default, end users have the ability to uninstall software on their clients. In the event the Tanium Client software is uninstalled, the Tanium Server is unable to manage the client and must redeploy to the client. Preventing the software from being dis
    SV-254932r867696_rule TANS-AP-000810 CCI-002165 MEDIUM The permissions on the Tanium Client directory must be restricted to only the SYSTEM account on all managed clients. By restricting access to the Tanium Client directory on managed clients, the Tanium client's ability to operate and function as designed will be protected from malicious attack and unintentional modifications by end users.
    SV-254933r867699_rule TANS-AP-000860 CCI-001849 MEDIUM The Tanium application must allocate audit record storage capacity in accordance with organization-defined audit record storage requirements. In order to ensure applications have a sufficient storage capacity in which to write the audit logs, applications need to be able to allocate audit record storage capacity. The task of allocating audit record storage capacity is usually performed during
    SV-254934r867702_rule TANS-AP-000865 CCI-001851 MEDIUM The Tanium application must offload audit records onto a different system or media than the system being audited. Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Offloading is a common process in information systems with limited audit storage capacity.
    SV-254935r867705_rule TANS-AP-000870 CCI-001855 MEDIUM The Tanium application must provide an immediate warning to the SA and ISSO (at a minimum) when allocated audit record storage volume reaches 75 percent of repository maximum audit record storage capacity. If security personnel are not notified immediately upon storage volume utilization reaching 75 percent, they are unable to plan for storage capacity expansion.
    SV-254936r870363_rule TANS-AP-000875 CCI-001858 MEDIUM The Tanium application must provide an immediate real-time alert to the SA and ISSO, at a minimum, of all audit failure events requiring real-time alerts. It is critical for the appropriate personnel to be aware if a system is at risk of failing to process audit logs as required. Without a real-time alert, security personnel may be unaware of an impending failure of the audit capability and system operation
    SV-254937r867711_rule TANS-AP-000935 CCI-001811 LOW Access to the Tanium Application Servers must be restricted. Only the designated administrator(s) can have elevated privileges to the Tanium Application Servers. Unauthorized software not only increases risk by increasing the number of potential vulnerabilities, it also can contain malicious code. Sending an alert (in real time) when unauthorized software is detected allows designated personnel to take action on t
    SV-254938r867714_rule TANS-AP-000940 CCI-001812 MEDIUM The Tanium application must prohibit user installation of software without explicit privileged status. Allowing regular users to install software without explicit privileges creates the risk that untested or potentially malicious software will be installed on the system. Explicit privileges (escalated or administrative privileges) provide the regular user
    SV-254939r867717_rule TANS-AP-000950 CCI-001813 MEDIUM The application must enforce access restrictions associated with changes to application configuration. Failure to provide logical access restrictions associated with changes to application configuration may have significant effects on the overall security of the system. When dealing with access restrictions pertaining to change control, it should be note
    SV-254940r867720_rule TANS-AP-000965 CCI-001762 MEDIUM Firewall rules must be configured on the Tanium Server for Console-to-Server communications. An HTML5 based application, the Tanium Console runs from any device with a browser that supports HTML5. For security, the HTTP and SOAP communication to the Tanium Server is SSL encrypted, so the Tanium Server installer configures the server to listen for
    SV-254941r867723_rule TANS-AP-000970 CCI-001762 MEDIUM Firewall rules must be configured on the Tanium Server for Server-to-Database communications. The Tanium Server can use either a SQL Server RDBMS installed locally to the same device as the Tanium Server application or a remote dedicated or shared SQL Server instance. Using a local SQL Server database typically requires no changes to network firew
    SV-254942r867726_rule TANS-AP-000975 CCI-001762 MEDIUM Firewall rules must be configured on the Tanium module server to allow Server-to-Module Server communications from the Tanium Server. The Tanium Module Server is used to extend the functionality of Tanium through the use of various workbenches. The Tanium Module Server requires communication with the Tanium Server on port 17477. Without a proper connection from the Tanium Server to the
    SV-254943r867729_rule TANS-AP-000980 CCI-001762 MEDIUM Firewall rules must be configured on the Tanium Server for Server-to-Module Server communications. The Tanium Module Server is used to extend the functionality of Tanium through the use of various workbenches. The Tanium Module Server requires communication with the Tanium Server on port 17477. Without a proper connection from the Tanium Server to the
    SV-254944r867732_rule TANS-AP-000985 CCI-001762 MEDIUM Firewall rules must be configured on the Tanium Server for Server-to-Zone Server communications. If using the Tanium Zone Server to proxy traffic from Tanium-managed computers on less trusted network segments to the Tanium Server on the core network, then the Tanium Zone Server Hub, typically installed to the Tanium Server device must be able to conn
    SV-254945r870382_rule TANS-AP-001090 CCI-002450 MEDIUM The SSLHonorCipherOrder must be configured to disable weak encryption algorithms on the Tanium Server. Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to protect data. The application must implement cryptographic modules adhering to the higher standards approved by the federal government since this provides ass
    SV-254946r870383_rule TANS-AP-001095 CCI-002450 MEDIUM The SSLCipherSuite must be configured to disable weak encryption algorithms on the Tanium Server. Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to protect data. The application must implement cryptographic modules adhering to the higher standards approved by the federal government since this provides ass
    SV-254947r867741_rule TANS-AP-001130 CCI-002470 MEDIUM The Tanium Server certificate must be signed by a DOD Certificate Authority. The Tanium Server has the option to use a "self-signed" certificate or a Trusted Certificate Authority signed certificate for SSL connections. During evaluations of Tanium in Lab settings, customers often conclude that a "self-signed" certificate is an ac
    SV-254948r867744_rule TANS-AP-001150 CCI-002385 MEDIUM The Tanium application must limit the bandwidth used in communicating with endpoints to prevent a denial of service (DoS) condition at the server. DoS is a condition when a resource is not available for legitimate users. When this occurs, the organization either cannot accomplish its mission or must operate at degraded capacity. This requirement addresses the configuration of applications to mitiga
    SV-254949r867747_rule TANS-AP-001215 CCI-002605 MEDIUM The Tanium application must install security-relevant software updates within the time period directed by an authoritative source (e.g., IAVM, CTOs, DTMs, and STIGs). Security flaws with software applications are discovered daily. Vendors are constantly updating and patching their products to address newly discovered security vulnerabilities. Organizations (including any contractor to the organization) are required to
    SV-254950r867750_rule TANS-AP-001250 CCI-002664 MEDIUM Tanium must alert the ISSO, ISSM, and other individuals designated by the local organization when the following Indicators of Compromise (IOCs) or potential compromise are detected: real time intrusion detection; threats identified by authoritative sources (e.g., CTOs); and Category I, II, IV, and VII incidents in accordance with CJCSM 6510.01B. When a security event occurs, the application that has detected the event must immediately notify the appropriate support personnel so they can respond appropriately. Alerts may be generated from a variety of sources, including, audit records or inputs
    SV-254951r870364_rule TANS-AP-001405 CCI-001851 MEDIUM The application must, at a minimum, offload interconnected systems in real time and offload standalone systems weekly. Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Offloading is a common process in information systems with limited audit storage capacity.
    SV-254952r867756_rule TANS-AP-001410 CCI-000366 MEDIUM Tanium Client processes must be excluded from on-access scan. Similar to any other host-based applications, the Tanium Client is subject to the restrictions other system-level software may place on an operating environment. That is to say that Antivirus, IPS, Encryption, or other security and management stack softwa
    SV-254953r867759_rule TANS-AP-001415 CCI-000366 MEDIUM Tanium Client directory and subsequent files must be excluded from on-access scan. Similar to any other host-based applications, the Tanium Client is subject to the restrictions other system-level software may place on an operating environment. That is to say that Antivirus, IPS, Encryption, or other security and management stack softwa
    SV-254954r867762_rule TANS-AP-001420 CCI-000366 MEDIUM Tanium endpoint files must be excluded from host-based intrusion prevention intervention. Similar to any other host-based applications, the Tanium Client is subject to the restrictions other system-level software may place on an operating environment. Antivirus, IPS, Encryption, or other security and management stack software may disallow the
    SV-254955r867765_rule TANS-AP-001425 CCI-000366 MEDIUM Tanium Server directory and subsequent files must be excluded from on-access scan. Similar to any other host-based applications, the Tanium Server is subject to the restrictions other system-level software may place on an operating environment. Antivirus, IPS, Encryption, or other security and management stack software may disallow the
    SV-254956r867768_rule TANS-AP-001430 CCI-000366 MEDIUM Tanium Server processes must be excluded from on-access scan. Similar to any other host-based applications, the Tanium Server is subject to the restrictions other system-level software may place on an operating environment. Antivirus, IPS, Encryption, or other security and management stack software may disallow the