V-67013 | High | Common Access Card (CAC)-based authentication must be enabled on the Tanium Server for network access with privileged accounts. | To assure accountability and prevent unauthenticated access, organizational users must be identified and authenticated to prevent potential misuse and compromise of the system.
Organizational... |
V-66995 | High | The Tanium Console_ProhibitSavedLogin option must be explicitly enabled to prevent console browsers from saving non-CAC logon information. | The Tanium Console, by default, can cache console users' credentials for convenience so that operators are not required to re-enter their passwords when logging back into the console. When this... |
V-67005 | High | Role-based system access must be configured to least privileged access to Tanium Server functions through the Tanium interface. | User accessibility to various Tanium Server functions performed via the console can be restricted by User Roles. Those User Roles are: Administrator, Read Only User, Question Author, Action User,... |
V-67085 | High | The Tanium Server certificate and private/public keys directory must be protected with appropriate permissions. | If the private key is discovered, an attacker can use the key to authenticate as an authorized user and gain access to the network infrastructure.
The cornerstone of the PKI is the private key... |
V-67017 | High | Common Access Card (CAC)-based authentication must be enforced on the Tanium Server for authentication for local access with privileged accounts. | To assure accountability and prevent unauthenticated access, organizational users must be identified and authenticated to prevent potential misuse and compromise of the system.
Organizational... |
V-66991 | Medium | The Tanium Client must ensure the authenticity of communications sessions when answering requests from the Tanium Server. | Authenticity protection provides protection against man-in-the-middle attacks/session hijacking and the insertion of false information into sessions.
Application communication sessions are... |
V-66993 | Medium | Tanium endpoint files must be protected from file encryption actions. | Similar to any other host-based applications, the Tanium Client is subject to the restrictions other System-level software may place on an operating environment. That is to say that Antivirus,... |
V-67065 | Medium | The Tanium Application Server must protect audit tools from unauthorized access. | Protecting audit data also includes identifying and protecting the tools used to view and manipulate log data. Therefore, protecting audit tools is necessary to prevent unauthorized operation on... |
V-66997 | Medium | The Tanium Application Server must be configured with a connector to sync to Microsoft Active Directory for account management functions. | By restricting access to the Tanium Server to only Microsoft Active Directory, user accounts and related permissions can be strictly monitored. Account management will be under the operational... |
V-66999 | Medium | The Tanium Application Server must be configured to only use Microsoft Active Directory for account management functions. | By restricting access to the Tanium Server to only Microsoft Active Directory, user accounts and related permissions can be strictly monitored. Account management will be under the cog of the... |
V-67033 | Medium | SQL stored queries or procedures installed during Tanium installation must be removed from the Tanium Server. | Failure to protect organizational information from data mining may result in a compromise of information.
Data storage objects include, for example, databases, database records, and database... |
V-67043 | Medium | Public keys of content providers must be validated against documented trusted content providers. | A Tanium Sensor, also called content, enables an organization to gather real-time inventory, configuration, and compliance data elements from managed computers. Sensors gather specific information... |
V-67037 | Medium | The Tanium Application Server console must be configured to initiate a session lock after a 15-minute period of inactivity. | The Tanium Console, when CAC is enabled, will initiate a session lock based upon the ActivClient or other Smart Card software.
By initiating the session lock, the console will be locked and not... |
V-66975 | Medium | The Tanium cryptographic signing capabilities must be enabled on the Tanium Server. | All of Tanium's signing capabilities should be enabled upon install. Tanium supports the cryptographic signing and verification before execution of all Sensors, Questions, Actions, Sensor... |
V-67077 | Medium | Firewall rules must be configured on the Tanium Server for Client-to-Server communications. | In addition to the client-to-server TCP communication that takes place over port 17472, Tanium Clients also communicate to other Tanium-managed computers over port 17472. The Tanium environment... |
V-67061 | Medium | Tanium Server files must be protected from file encryption actions. | Similar to any other host-based applications, the Tanium Server is subject to the restrictions other System-level software may place on an operating environment. Antivirus, Encryption, or other... |
V-66987 | Medium | The Tanium Client - Set Action Lock must be set to OFF during maintenance window timeframes only. | Set Action Lock On will prevent any managed system from executing Tanium generated actions. This functionality is helpful when needing to eliminate systems from taking actions (e.g. patch... |
V-67071 | Medium | The Tanium cryptographic signing capabilities must be enabled on the Tanium Server. | All of Tanium's signing capabilities should be enabled upon install. Tanium supports the cryptographic signing and verification before execution of all Sensors, Questions, Actions, Sensor... |
V-67089 | Medium | The Tanium Module server must be installed on a separate system. | Unauthorized access to the Tanium Server is protected by disabling the Module Server service on the Tanium Server and by configuring the Module Server on a separate system.
When X509 smartcard... |
V-66985 | Medium | Tanium endpoint files must be protected from antivirus actions. | Similar to any other host-based applications, the Tanium Client is subject to the restrictions other System-level software may place on an operating environment. That is to say that Antivirus,... |
V-66979 | Medium | Control of the Tanium Client service must be restricted to SYSTEM access only for all managed clients. | The reliability of the Tanium client's ability to operate depends upon controlling access to the Tanium client service. By restricting access to SYSTEM access only, the non-Tanium system... |
V-66983 | Medium | The permissions on the Tanium Client directory must be restricted to only the SYSTEM account on all managed clients. | By restricting access to the Tanium Client directory on managed clients, the Tanium client's ability to operate and function as designed will be protected from malicious attack and unintentional... |
V-66977 | Medium | Firewall rules must be configured on the Tanium Endpoints for Client-to-Server communications. | In addition to the client-to-server TCP communication that takes place over port 17472, Tanium Clients also communicate to other Tanium-managed computers over port 17472. The Tanium environment... |
V-67087 | Medium | Flash must not be installed on the Tanium Server. | Adobe Flash Player is freeware software for using content created on the Adobe Flash platform, including viewing multimedia, executing rich Internet applications, and streaming video and audio.... |
V-67073 | Medium | The Tanium Server must be configured to only allow signed content to be imported. | Changes to any software components can have significant effects on the overall security of the application. Verifying software components have been digitally signed using a certificate that is... |
V-67081 | Medium | The Tanium Application Server must be configured to prohibit or restrict the use of organization-defined functions, ports, protocols, and/or services, as defined in the PPSM CAL and vulnerability assessments. | In order to prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling (i.e., embedding of data types within data types), organizations must... |
V-66973 | Medium | Access to Tanium logs on each endpoint must be restricted by permissions. | For the Tanium Client software to run without impact from external negligent or malicious changes, the permissions on the Tanium log files and their directory must be restricted.
Tanium is... |
V-67083 | Medium | The Tanium Server certificates must have Extended Key Usage entries for the serverAuth object TLS Web Server Authentication and the clientAuth object TLS Web Client Authentication. | Information can be either unintentionally or maliciously disclosed or modified during reception including, for example, during aggregation, at protocol transformation points, and during... |
V-66971 | Medium | The Tanium endpoint must have the Tanium Servers public key in its installation. | Without cryptographic integrity protections, information can be altered by unauthorized users without detection.
Remote access is access to DoD nonpublic information systems by an authorized... |
V-67023 | Medium | The Tanium SQL database must be installed on a separate system. | Failure to protect organizational information from data mining may result in a compromise of information.
Data storage objects include, for example, databases, database records, and database... |
V-67007 | Medium | Tanium console users User Roles must be validated against the documentation for User Roles. | System access should be reviewed periodically to verify that all Tanium users are assigned the appropriate role, with the least privileged access possible to perform assigned tasks being the... |
V-67001 | Medium | Computer Groups must be used to restrict console users from affecting changes to unauthorized computers. | Computer Groups allow a site running Tanium to assign responsibility of specific Computer Groups to specific Tanium console users. By doing so, a desktop administrator, for example, will not have... |
V-67109 | Medium | The Tanium application must authenticate all endpoint devices before allowing a network connection using bidirectional authentication that is cryptographically based. | Without authenticating devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. Bidirectional authentication provides stronger safeguards to validate... |
V-67003 | Medium | Documentation identifying Tanium console users and their respective User Roles must be maintained. | System access should be reviewed periodically to verify that all Tanium users are assigned the appropriate role, with the least privileged access possible to perform assigned tasks being the... |
V-67057 | Medium | The Tanium Application Server console must be configured to display the Standard Mandatory DoD Notice and Consent Banner before granting access to The Tanium Application Server. | Display of the DoD-approved use notification before granting access to the application ensures privacy and security notification verbiage used is consistent with applicable federal laws, Executive... |
V-67105 | Medium | Firewall rules must be configured on the Tanium Server for Server-to-Module Server communications. | Tanium 6.5 introduces the Tanium Module Server (formerly known as the Tanium Plugin Server) used to extend the functionality of Tanium through the use of various workbenches. The Tanium Module... |
V-67107 | Medium | Firewall rules must be configured on the Tanium Server for Server-to-Zone Server communications. | If you are using the Tanium Zone Server to proxy traffic from Tanium-managed computers on less trusted network segments to the Tanium Server on the core network, then the Tanium Zone Server Hub,... |
V-67009 | Medium | Documentation identifying Tanium console users and their respective Computer Groups rights must be maintained. | System access should be reviewed periodically to verify that all Tanium users are assigned the appropriate role, with the least privileged access possible to perform assigned tasks being the... |
V-67101 | Medium | A connector must be configured to send log data to offline log collection. | While the Tanium Server records audit log entries to the Tanium SQL database, retrieval and aggregation of log data through the Tanium console is not efficient.
The Tanium Connect module allows... |
V-67103 | Medium | Firewall rules must be configured on the Tanium module server to allow Server-to-Module Server communications from the Tanium Server. | Tanium 6.5 introduces the Tanium Module Server (formerly known as the Tanium Plugin Server) used to extend the functionality of Tanium through the use of various workbenches. The Tanium Module... |
V-67067 | Medium | The Tanium Application Server must protect audit tools from unauthorized modification. | Protecting audit data also includes identifying and protecting the tools used to view and manipulate log data. Therefore, protecting audit tools is necessary to prevent unauthorized operation on... |
V-67029 | Medium | The Tanium Server installers account SQL database permissions must be reduced from sysadmin to db_owner. | Creating the tanium and tanium_archive databases through the Tanium Server installer program or using the database create SQL scripts requires Sysadmin-level permissions. Once the databases have... |
V-67055 | Medium | Tanium Server files must be protected from antivirus actions. | Similar to any other host-based applications, the Tanium Server is subject to the restrictions other System-level software may place on an operating environment. Antivirus, Encryption, or other... |
V-67045 | Medium | The Tanium Action Approval feature must be enabled for two person integrity when deploying actions to endpoints. | The Tanium Action Approval feature provides a "four eyes" control mechanism designed to achieve a high level of security and reduce the possibility of error for critical operations.
When this... |
V-67047 | Medium | The Tanium documentation identifying recognized and trusted IOC Detect streams must be maintained. | An IOC stream is a series or “stream” of IOCs that are imported from a vendor based on a subscription service. An IOC stream can be downloaded manually or on a scheduled basis. The items in an IOC... |
V-67031 | Medium | Firewall rules must be configured on the Tanium Server for Server-to-Database communications. | The Tanium Server can use either a SQL Server RDBMS installed locally to the same device as the Tanium Server application or a remote dedicated or shared SQL Server instance. Using a local SQL... |
V-67049 | Medium | The Tanium IOC Detect must be configured to receive IOC streams only from trusted sources. | An IOC stream is a series or “stream” of IOCs that are imported from a vendor based on a subscription service or manually downloaded and placed in a folder. IOC Detect can be configured to... |
V-67021 | Medium | Firewall rules must be configured on the Tanium Server for Console-to-Server communications. | An HTML5/Adobe Flash based application, the Tanium Console runs from any device with a browser configured with Adobe Flash Player 11.5 or higher. For security, the TCP and SOAP communication to... |
V-67027 | Medium | The access to the Tanium SQL database must be restricted. Only the designated database administrator(s) can have elevated privileges to the Tanium SQL database. | After the Tanium Server has been installed and the Tanium databases created, only the Tanium Receiver, Tanium Module, and Tanium connection manager (ad sync) service needs to access the SQL Server... |
V-67025 | Medium | The Tanium SQL server must be dedicated to the Tanium application database. | Failure to protect organizational information from data mining may result in a compromise of information.
Data storage objects include, for example, databases, database records, and database... |
V-67053 | Medium | The Tanium IOC Detect module must be configured to forward events. | Indicators of Compromise (IOC) is an artifact which is observed on the network or system that indicates computer intrusion. The Tanium IOC Detect module detects, manages, and analyzes systems... |
V-67059 | Medium | The Tanium Application Server console must be configured to retain the Standard Mandatory DoD Notice and Consent Banner on the screen until users acknowledge the usage conditions and take explicit actions to log on for further access. | The banner must be acknowledged by the user prior to allowing the user access to the application. This provides assurance that the user has seen the message and accepted the conditions for access.... |
V-67075 | Medium | All installation files originally downloaded to the Tanium Server must be configured to download to a location other than the Tanium Server directory. | Typically, the Tanium Server stores the Package Source Files that it downloads from the Internet and server shares or files uploaded through the Tanium Console in a subdirectory of the server's... |
V-66989 | Medium | The Tanium Client Deployment Tool (CDT) must not be configured to use the psexec method of deployment. | When using the Tanium Client Deployment Tool (CDT), using psexec represents an increased vulnerability as the NTLM hash and clear text passwords of the authenticating user is exposed in the memory... |
V-67069 | Medium | The Tanium Application Server must protect audit tools from unauthorized deletion. | Protecting audit data also includes identifying and protecting the tools used to view and manipulate log data. Therefore, protecting audit tools is necessary to prevent unauthorized operation on... |
V-67051 | Medium | The LogFileSize on Tanium Servers must be enabled with a value of 104857600 (100MB) or more. | Although a full set of usage logs for each Tanium component is, by default, no more than 100 MB, logging is initially disabled to minimize impact to any computers that might be critically low on... |
V-67079 | Medium | Firewall rules must be configured on the Tanium Zone Server for Client-to-Zone Server communications. | In customer environments using the Tanium Zone Server, a Tanium Client may be configured to point to a Zone Server instead of a Tanium Server. The communication requirements for these Clients are... |
V-67099 | Medium | All Active Directory accounts synchronized with Tanium must be non-privileged domain accounts. | Tanium has the ability to synchronize with Active Directory for Tanium account management. Tanium advises that all replicated accounts should be non-privileged domain accounts. In doing so, should... |
V-66981 | Medium | The ability to uninstall the Tanium Client service must be disabled on all managed clients. | By default, end users have the ability to uninstall software on their clients. In the event the Tanium Client software is uninstalled, the Tanium Server is unable to manage the client and must... |
V-67063 | Medium | The SSLCipherSuite must be configured to disable weak encryption algorithms on the Tanium Server. | Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to protect data. The application must implement cryptographic modules adhering to the higher standards... |
V-67093 | Medium | The Tanium Server http directory and sub-directories must be restricted with appropriate permissions. | Discretionary Access Control (DAC) is based on the notion that individual users are "owners" of objects and therefore have discretion over who should be authorized to access the object and in... |
V-67091 | Medium | The permissions on the Tanium Server directory must be restricted to only the Tanium service account. | Discretionary Access Control (DAC) is based on the notion that individual users are "owners" of objects and therefore have discretion over who should be authorized to access the object and in... |
V-67041 | Medium | Content providers must provide their public key to the Tanium administrator to import for validating signed content. | A Tanium Sensor, also called content, enables an organization to gather real-time inventory, configuration, and compliance data elements from managed computers. Sensors gather specific information... |
V-67097 | Medium | The Tanium Server Logs and TDL_Logs directories must be restricted with appropriate permissions. | Discretionary Access Control (DAC) is based on the notion that individual users are "owners" of objects and therefore have discretion over who should be authorized to access the object and in... |
V-67095 | Medium | The permissions on the Tanium Server registry keys must be restricted to only the Tanium service account. | Discretionary Access Control (DAC) is based on the notion that individual users are "owners" of objects and therefore have discretion over who should be authorized to access the object and in... |
V-67011 | Medium | Tanium console users Computer Group rights must be validated against the documentation for Computer Group rights. | System access should be reviewed periodically to verify that all Tanium users are assigned the appropriate role, with the least privileged access possible to perform assigned tasks being the... |
V-67119 | Medium | File integrity monitoring of critical executables that Tanium uses must be configured. | Tanium inherently watches files and their respective hash values for change but while Tanium can do file integrity checks of critical executables, it is important to conduct File Integrity... |
V-67015 | Medium | Common Access Card (CAC)-based authentication must be enabled on the Tanium Server for network access with non-privileged accounts. | To assure accountability and prevent unauthenticated access, non-privileged users must utilize multifactor authentication to prevent potential misuse and compromise of the system.
Multifactor... |
V-67117 | Medium | The Tanium Server must ensure the authenticity of communications sessions when making requests from Tanium Clients. | Authenticity protection provides protection against man-in-the-middle attacks/session hijacking and the insertion of false information into sessions.
Application communication sessions are... |
V-67115 | Medium | Any configured EMAIL RESULTS connectors must be configured to enable TLS/SSL to encrypt communications. | Information can be either unintentionally or maliciously disclosed or modified during preparation for transmission including, for example, during aggregation, at protocol transformation points,... |
V-67019 | Medium | Common Access Card (CAC)-based authentication must be enforced on the Tanium Server for authentication for local access with non-privileged accounts. | To assure accountability and prevent unauthenticated access, privileged users must utilize multifactor authentication to prevent potential misuse and compromise of the system.
Multifactor... |
V-67113 | Medium | The Tanium Server certificate must be signed by a DoD Certificate Authority. | The Tanium Server has the option to use a "self-signed" certificate or a Trusted Certificate Authority signed certificate for SSL connections. During evaluations of Tanium in Lab settings,... |
V-67039 | Medium | Trusted Content providers must be documented. | A Tanium Sensor, also called content, enables an organization to gather real-time inventory, configuration, and compliance data elements from managed computers. Sensors gather specific information... |
V-67111 | Medium | The SSLHonorCipherOrder DWORD must be configured to disable weak encryption algorithms on the Tanium Server. | Use of weak or untested encryption algorithms undermines the purposes of utilizing encryption to protect data. The application must implement cryptographic modules adhering to the higher standards... |
V-67035 | Medium | The Tanium Application Server must protect the confidentiality and integrity of transmitted information. | Without protection of the transmitted information, confidentiality and integrity may be compromised since unprotected communications can be intercepted and either read or altered.
This... |