Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-254877 | TANS-AP-000040 | SV-254877r960762_rule | Medium |
Description |
---|
Without cryptographic integrity protections in the Tanium Client, information could be altered by unauthorized users without detection. Cryptographic mechanisms used for protecting the integrity of Tanium communications information include signed hash functions using asymmetric cryptography enabling distribution of the public key to verify the hash information while maintaining the confidentiality of the secret key used to generate the hash. |
STIG | Date |
---|---|
Tanium 7.x Application on TanOS Security Technical Implementation Guide | 2024-06-04 |
Check Text ( C-58490r867529_chk ) |
---|
1. Using a web browser on a system that has connectivity to the Tanium application, access the Tanium application web user interface (UI) and log on with multi-factor authentication. 2. Click "Administration" on the top navigation banner. 3. Under "Configuration," select "Client Status". 4. Change "Show systems that have reported in the last:"; enter "7" in the first field. 5. Select "Days" from the drop-down menu in the second field to determine if any endpoints connected with an invalid key. If any systems are listed with "No" in the "Valid Key" column, this is a finding. |
Fix Text (F-58434r867530_fix) |
---|
For systems that do not have a valid key for the Tanium Server, redeploy the client software from Tanium using Tanium Client Management or work with the Tanium system administrator to accomplish this. 1. Configure a deployment. 2. Deploy the package or installer. 3. Target appropriate systems. |