UCF STIG Viewer Logo

The Tanium documentation identifying recognized and trusted indicator of compromise (IOC) streams must be maintained.


Overview

Finding ID Version Rule ID IA Controls Severity
V-253842 TANS-SV-000007 SV-253842r842554_rule Medium
Description
Using trusted and recognized IOC sources may detect compromise and prevent systems from becoming compromised. An IOC stream is a series or stream of IOCs that are imported from a vendor based on a subscription service. An IOC stream can be downloaded manually or on a scheduled basis. The items in an IOC stream can be manipulated separately after they are imported.
STIG Date
Tanium 7.x Security Technical Implementation Guide 2022-08-24

Details

Check Text ( C-57294r842552_chk )
Consult with the Tanium system administrator to determine if the Threat Response module is being used. If it is not, this is not applicable.

Review the documented list of IOC trusted stream sources.

If the site uses an external source for IOCs and the IOC trusted stream source is not documented, this is a finding.
Fix Text (F-57245r842553_fix)
Prepare and maintain documentation identifying the Threat Response trusted stream sources.