Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-234101 | TANS-SV-000030 | SV-234101r612749_rule | Medium |
Description |
---|
Tanium inherently watches files and their respective hash values for change but while Tanium can do file integrity checks of critical executables, it is important to conduct File Integrity Monitoring (FIM) via an outside service such as Host Based Security System (HBSS) or similar security suites with FIM capability. These technologies provide independent monitoring of critical Tanium and system binaries. |
STIG | Date |
---|---|
Tanium 7.3 Security Technical Implementation Guide | 2021-12-20 |
Check Text ( C-37286r610803_chk ) |
---|
If the site is using Tanium Integrity Monitor, Tanium Integrity Monitor should be used to monitor the file integrity of Tanium critical files. If Tanium Integrity Monitor is not installed, a third-party file integrity-monitoring tool must be used to monitor Tanium critical executables, defined files within the Tanium Server directory path. If the file integrity of Tanium critical executables is not monitored, this is a finding. |
Fix Text (F-37251r610804_fix) |
---|
Implement a file integrity monitoring system to monitor the Tanium critical executable files. |