UCF STIG Viewer Logo

Tanium 7.3 Security Technical Implementation Guide


Overview

Date Finding Count (102)
2019-02-22 CAT I (High): 3 CAT II (Med): 99 CAT III (Low): 0
STIG Description
This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.

Available Profiles



Findings (MAC III - Administrative Sensitive)

Finding ID Severity Title
V-92083 High Common Access Card (CAC)-based authentication must be enabled on the Tanium Server for network access with privileged accounts.
V-92075 High Role-based system access must be configured to least privileged access to Tanium Server functions through the Tanium interface.
V-92157 High The Tanium Server certificate and private/public keys directory must be protected with appropriate permissions.
V-92131 Medium Content providers must provide their public key to the Tanium administrator to import for validating signed content.
V-92085 Medium Firewall rules must be configured on the Tanium Server for Console-to-Server communications.
V-92087 Medium The publicly accessible Tanium application must display the Standard Mandatory DoD Notice and Consent Banner before granting access to the application.
V-92081 Medium Tanium console users Computer Group rights must be validated against the documentation for Computer Group rights.
V-92153 Medium The Tanium Application Server must be configured to prohibit or restrict the use of organization-defined functions, ports, protocols, and/or services, as defined in the PPSM CAL and vulnerability assessments.
V-92151 Medium Firewall rules must be configured on the Tanium Zone Server for Client-to-Zone Server communications.
V-92089 Medium Tanium must alert the ISSO and SA (at a minimum) in the event of an audit processing failure.
V-92155 Medium The Tanium Server certificates must have Extended Key Usage entries for the serverAuth object TLS Web Server Authentication and the clientAuth object TLS Web Client Authentication.
V-92139 Medium The Tanium Detect must be configured to receive IOC streams only from trusted sources.
V-92099 Medium The Tanium application must provide an immediate warning to the SA and ISSO (at a minimum) when allocated audit record storage volume reaches 75% of repository maximum audit record storage capacity.
V-92053 Medium The permissions on the Tanium Client directory must be restricted to only the SYSTEM account on all managed clients.
V-92149 Medium Firewall rules must be configured on the Tanium Server for Client-to-Server communications.
V-92091 Medium Flaw remediation Tanium applications must employ automated mechanisms to determine the state of information system components with regard to flaw remediation using the following frequency: continuously, where HBSS is used; 30 days, for any additional internal network scans not covered by HBSS; and annually, for external scans by Computer Network Defense Service Provider (CNDSP).
V-92097 Medium The Tanium application must notify SA and ISSO of account enabling actions.
V-92185 Medium Any Tanium configured EMAIL RESULTS connectors must be configured to enable TLS/SSL to encrypt communications.
V-92141 Medium The Tanium Connect module must be configured to forward Tanium Detect events to identified destinations.
V-92143 Medium The Tanium cryptographic signing capabilities must be enabled on the Tanium Server.
V-92145 Medium The Tanium Server must be configured to only allow signed content to be imported.
V-92147 Medium All installation files originally downloaded to the Tanium Server must be configured to download to a location other than the Tanium Server directory.
V-92047 Medium Firewall rules must be configured on the Tanium Endpoints for Client-to-Server communications.
V-92037 Medium Tanium must employ a deny-all, permit-by-exception (whitelist) policy to allow the execution of authorized software programs.
V-92059 Medium Tanium endpoint files must be protected from file encryption actions.
V-92175 Medium Firewall rules must be configured on the Tanium module server to allow Server-to-Module Server communications from the Tanium Server.
V-92177 Medium Firewall rules must be configured on the Tanium Server for Server-to-Module Server communications.
V-92171 Medium A Tanium connector must be configured to send log data to an external audit log reduction capable system.
V-92173 Medium File integrity monitoring of critical executables that Tanium uses must be configured.
V-92093 Medium Tanium must notify SA and ISSO when accounts are created.
V-92179 Medium Firewall rules must be configured on the Tanium Server for Server-to-Zone Server communications.
V-92069 Medium The Tanium Application Server must be configured to only use Microsoft Active Directory for account management functions.
V-92067 Medium The Tanium Application Server must be configured with a connector to sync to Microsoft Active Directory for account management functions.
V-92065 Medium The Tanium application must retain the session lock until the user reestablishes access using established identification and authentication procedures.
V-92063 Medium Tanium endpoint files must be excluded from host-based intrusion prevention intervention.
V-92061 Medium The Tanium application must restrict the ability of individuals to place too much impact upon the network, which might result in a Denial of Service (DoS) event on the network by using RandomSensorDelayInSeconds.
V-92219 Medium The Tanium Application Server must install security-relevant software updates within the time period directed by an authoritative source (e.g., IAVM, CTOs, DTMs, and STIGs).
V-92095 Medium Tanium must notify SA and ISSO when accounts are modified.
V-92163 Medium The Tanium Server http directory and sub-directories must be restricted with appropriate permissions.
V-92161 Medium The Tanium Server directory must be restricted with appropriate permissions.
V-92167 Medium The Tanium Server Logs and TDL_Logs directories must be restricted with appropriate permissions.
V-92165 Medium The permissions on the Tanium Server registry keys must be restricted to only the Tanium service account and the [Tanium Admins] group.
V-92169 Medium All Active Directory accounts synchronized with Tanium for non-privileged functions must be non-privileged domain accounts.
V-92109 Medium The Tanium application must prohibit user installation of software without explicit privileged status.
V-92079 Medium Documentation identifying Tanium console users and their respective Computer Group rights must be maintained.
V-92077 Medium Tanium console users User Roles must be validated against the documentation for User Roles.
V-92071 Medium Tanium Computer Groups must be used to restrict console users from affecting changes to unauthorized computers.
V-92073 Medium Documentation identifying Tanium console users, their respective functional roles, and computer groups must be maintained.
V-92049 Medium Control of the Tanium Client service must be restricted to SYSTEM access only for all managed clients.
V-92199 Medium The Tanium documentation identifying recognized and trusted folders for Detect Local Directory Source must be maintained.
V-92197 Medium The Tanium soap_max_keep_alive setting must be explicitly enabled to limit the number of simultaneous sessions.
V-92195 Medium The Tanium max_soap_sessions_per_user setting must be explicitly enabled to limit the number of simultaneous sessions.
V-92193 Medium The Tanium max_soap_sessions_total setting must be explicitly enabled to limit the number of simultaneous sessions.
V-92159 Medium The Tanium Module server must be installed on a separate system.
V-92191 Medium The SSLCipherSuite must be configured to disable weak encryption algorithms on the Tanium Server.
V-92117 Medium The access to the Tanium SQL database must be restricted. Only the designated database administrator(s) can have elevated privileges to the Tanium SQL database.
V-92115 Medium The Tanium application database must be dedicated to only the Tanium application.
V-92113 Medium The Tanium database(s) must be installed on a separate system.
V-92209 Medium Tanium Comply must be configured to receive OVAL feeds only from trusted sources.
V-92207 Medium Tanium Comply must be configured to receive SCAP content only from trusted sources.
V-92043 Medium Access to Tanium logs on each endpoint must be restricted by permissions.
V-92203 Medium The Tanium documentation identifying recognized and trusted SCAP sources must be maintained.
V-92119 Medium The Tanium Server installers account database permissions must be reduced to an appropriate level.
V-92111 Medium Documentation defining Tanium functional roles must be maintained.
V-92041 Medium The Tanium endpoint must have the Tanium Servers public key in its installation.
V-92033 Medium Tanium must centrally review and analyze audit records from multiple components within the system.
V-92205 Medium The Tanium documentation identifying recognized and trusted OVAL feeds must be maintained.
V-92035 Medium Tanium must implement organization-defined automated security responses if baseline configurations are changed in an unauthorized manner.
V-92057 Medium The Tanium Client Deployment Tool (CDT) must not be configured to use the psexec method of deployment.
V-92055 Medium Tanium endpoint files must be excluded from on-access antivirus actions.
V-92189 Medium Tanium Server files must be protected from file encryption actions.
V-92051 Medium The ability to uninstall the Tanium Client service must be disabled on all managed clients.
V-92045 Medium The Tanium cryptographic signing capabilities must be enabled on the Tanium Clients to safeguard the authenticity of communications sessions when answering requests from the Tanium Server.
V-92187 Medium Tanium Server files must be excluded from on-access antivirus actions.
V-92181 Medium The SSLHonorCipherOrder must be configured to disable weak encryption algorithms on the Tanium Server.
V-92183 Medium The Tanium Server certificate must be signed by a DoD Certificate Authority.
V-92105 Medium Tanium must notify SA and ISSO for account disabling actions.
V-92107 Medium Tanium must notify SA and ISSO for account removal actions.
V-92201 Medium The Tanium Detect Local Directory Source must be configured to restrict access to only authorized maintainers of Intel.
V-92103 Medium Common Access Card (CAC)-based authentication must be enabled and enforced on the Tanium Server for all access and all accounts.
V-92215 Medium The Tanium SQL Server RDBMS must be configured with sufficient free space to ensure audit logging is not impacted.
V-92217 Medium The Tanium application must limit the bandwidth used in communicating with endpoints to prevent a Denial of Service (DoS) condition at the server.
V-92211 Medium The Tanium application must be configured in a High-Availability (HA) setup to ensure minimal loss of data and minimal disruption to mission processes in the event of a system failure.
V-92213 Medium The bandwidth consumption for the Tanium Application server must be limited.
V-92101 Medium The Tanium enterprise audit log reduction option must be configured to provide alerts based off Tanium audit data.
V-92229 Medium The Tanium web server must be tuned to handle the operational requirements of the hosted application.
V-92133 Medium Tanium public keys of content providers must be validated against documented trusted content providers.
V-92135 Medium The Tanium Action Approval feature must be enabled for two-person integrity when deploying actions to endpoints.
V-92137 Medium The Tanium documentation identifying recognized and trusted Intel streams must be maintained.
V-92221 Medium Tanium Server files must be excluded from host-based intrusion prevention intervention.
V-92223 Medium The Tanium application must set an absolute timeout for sessions.
V-92225 Medium The Tanium application must set an inactive timeout for sessions.
V-92227 Medium The Tanium application service must be protected from being stopped by a non-privileged user.
V-92235 Medium The Tanium application must be configured to communicate using TLS 1.2 Strict Only.
V-92233 Medium The Tanium application must be configured to communicate using TLS 1.2 Strict Only.
V-92231 Medium The Tanium application, SQL and Module servers must all be configured to communicate using TLS 1.2 Strict Only.
V-92039 Medium The vulnerability scanning application must implement privileged access authorization to all Tanium information systems and infrastructure components for selected organization-defined vulnerability scanning activities.
V-92129 Medium Tanium Trusted Content providers must be documented.
V-92127 Medium The Tanium Application Server console must be configured to initiate a session lock after a 15-minute period of inactivity.
V-92125 Medium The Tanium Server must protect the confidentiality and integrity of transmitted information, in preparation to be transmitted and data at rest, with cryptographic signing capabilities enabled to protect the authenticity of communications sessions when making requests from Tanium Clients.
V-92123 Medium SQL stored queries or procedures installed during Tanium installation must be removed from the Tanium Server.
V-92121 Medium Firewall rules must be configured on the Tanium Server for Server-to-Database communications.