UCF STIG Viewer Logo

Tanium console users Computer Group rights must be validated against the documentation for Computer Group rights.


Overview

Finding ID Version Rule ID IA Controls Severity
V-78615 TANS-CN-000009 SV-93321r1_rule Medium
Description
System access should be reviewed periodically to verify that all Tanium users are assigned the appropriate role, with the least privileged access possible to perform assigned tasks being the recommended best practice. Users who have been removed from the documentation should no longer be configured as a Tanium Console User. Consider removing users that have not logged onto the system within a predetermined time frame.
STIG Date
Tanium 7.0 Security Technical Implementation Guide 2018-07-09

Details

Check Text ( C-78185r1_chk )
Using a web browser on a system that has connectivity to Tanium, access the Tanium web user interface (UI) and log on with CAC.

Click on the navigation button (hamburger menu) on the top left of the console.

Click on "Administration".

Select the "Users" tab.

Verify each user against the Tanium approved users list, and review the assigned group rights for each user against the "Group Rights" column.

If any user exists in Tanium but is not on the Tanium-approved users list and/or if any user exists in Tanium with more Group Rights than documented, this is a finding.
Fix Text (F-85351r1_fix)
Using a web browser on a system that has connectivity to Tanium, access the Tanium web UI and log on with CAC.

Click on the navigation button (hamburger menu) on the top left of the console and then click on "Administration".

Select the "Users" tab.

For any user(s) in Tanium who is not on the approved, documented Tanium user list, access the Microsoft Windows Active Directory Management and remove the respective user(s) from the AD Security Group in which those user(s) are members.

For any user in Tanium who has not been assigned one or more Computer Groups as has been documented in the Computer Groups list, access the Microsoft Windows Active Directory Management and add the respective user(s) to the AD Security Groups applicable for the roles for which the user(s) have been documented to be authorized.

Click "Save".